Evidence Explorer
Browse 107 technical reports from the Facebook iOS surveillance investigation. Filter by hypothesis, grade, or phase to find specific evidence.
Complete Data Harvesting Audit
10 categories of data collection across 61 frameworks
The 8 Most Alarming Findings
Shadow permissions, DEFCON system, screen capture, privacy counter
Anti-Forensics Binary Analysis Report
Binary analysis of Facebook iOS v345.0 reveals a comprehensive anti-forensics system designed to: 1. Detect debugging and analysis tools 2. Validate SSL/TLS certificate chains 3. Monitor network environment for proxies 4. Dynamically enumerate loaded libraries
AUDIO-TO-ADVERTISING-PIPELINE: Complete Evidence Chain
This document compiles forensic evidence proving that Facebook iOS integrates audio capture directly with advertising and analytics infrastructure. The audio capture mechanism is not isolated to legitimate use cases (calls, voice messages) but is architecturally coupled with Facebook's advertising targeting system.
H2 Indicator Suppression Analysis
The investigation reveals a server-controlled flag `should_hide_microtray` that allows Facebook to remotely suppress the microphone indicator tray on iOS. Combined with audio session mode manipulation via `AVAudioSessionModeVoicePrompt`, this provides a mechanism to capture audio while minimizing user awareness.
SA-001 Decompilation Report
`./analysis/facebook/345.0/Facebook.app/Frameworks/FBSharedFramework.framework/FBSharedFramework`
SA-002 Symbol Trace Report
`./analysis/facebook/345.0/Facebook.app/Frameworks/FBSharedFramework.framework/FBSharedFramework`
SA-007 GPU Shader Analysis Report
Analyze FBDynamicImageOverlayFilter and related GPU pixel manipulation for steganographic embedding.
SA-009 Bridge Decompiler Analysis Report
Decompile the 5 bridge functions connecting audio pipeline to network upload.
SA-011 Category Spoof Analysis Report
Analyze how Facebook spoofs AVAudioSession category to hide microphone access.
SA-012 Flag Tracer Analysis Report
Trace the complete server→client flag activation path for audio control.
SA-014 Metal Shader Extraction Report
Complete extraction and analysis of the `extractFromSample` steganographic decoder shader embedded in the Facebook iOS binary. This shader performs IEEE 754 floating-point reconstruction from 14 pixel locations using BGR channel encoding, yielding 84 bits per frame (two 32-bit floats plus sign bits).
SA-015: FBSpeechHelper H2 Server Socket Analysis Report
The FBSpeechHelper infrastructure provides a complete real-time speech-to-text transmission system using WebSocket (WSS) connections to Facebook's "Shortwave" speech recognition service. Audio is captured via iOS microphone, optionally encoded using OPUS codec, and streamed to `wss://shortwave.facebook.com/v2/vp/recognition` for transcription. The system is exposed to React Native via a bridge module, enabling JavaScript-level activation.
SA-020: Shadow Buffer Mechanism and Duplicate Capture Stream Analysis
Investigation of the FBSharedFramework binary reveals a sophisticated triple-buffer audio capture architecture with an **RTC notification bypass mechanism** that allows audio capture to continue independently of WebRTC client state changes. The `audioCaptureIgnoreRTCClientNotification` flag provides a documented mechanism for maintaining audio capture even when RTC sessions are deactivated, explaining the 9,900+ RTC deactivation events observed alongside continued capture operations.
SA-021 E2EE/Noise Protocol Key Negotiation Analysis Report
The Facebook iOS app implements a multi-layer encryption architecture for real-time audio/video calls: 1. **E2EE Layer**: End-to-end encryption indicated by model updates, with session-level enforcement 2. **DTLS Layer**: Transport-level encryption for WebRTC signaling 3. **Media Encryption**: Per-attachment encryption keys for audio/video content
SA-022: GraphQL RealtimeConfig and Alternative Config Push Mechanisms
Analysis of FBSharedFramework reveals a multi-layered configuration push architecture that enables Facebook to remotely control audio behavior through multiple pathways. The investigation confirms four distinct config update mechanisms working in coordination, with the sound toggle setting changes broadcast via `NSNotification` to all listening components.
SA-024: VoIP/Conferencing Streaming Infrastructure Analysis
Forensic analysis of Facebook iOS v345.0 reveals a sophisticated real-time audio streaming infrastructure that combines VoIP, WebRTC, QUIC transport, and Opus codec technologies. This infrastructure provides the capability for efficient, low-latency audio streaming that could theoretically support always-on audio surveillance with minimal battery and bandwidth impact.
SA-025: Dual-Layer Encryption Architecture Analysis
Analysis of Facebook iOS v345.0 reveals a **dual-layer encryption architecture** for real-time audio streaming that makes traffic analysis and interception extremely difficult. The system combines: 1. **Application Layer:** Noise Protocol E2EE (AES-256-GCM) for audio content 2. **Transport Layer:** QUIC with TLS 1.3 (Fizz) for network transport
SA-035: SoundToggle Remote Activation Proof
**Investigation Status:** GRADE A - Complete Config to Activation Chain with Timing Evidence This investigation proves that `SoundToggleSettingOnProgrammatically` enables remote-controlled microphone activation through Facebook's MobileConfig system. The evidence establishes a complete chain from server-pushed configuration flags to audio session activation with microphone capability. **Binary Analyzed:** Facebook iOS v345.0 - FBSharedFramework.framework
FB Exposed Website Orchestration Prompt
Create a compelling, evidence-driven website at **fb.definitelynot.ai** that presents the complete Facebook iOS surveillance investigation findings in an accessible, visually stunning format. This site must transform our technical investigation into an undeniable public disclosure.
SA-019: Overlay Audio Segments and Muted Segment Analysis Report
Analysis of the Facebook binary reveals a sophisticated multi-layer audio architecture with `overlayAudioSegments` for secondary audio tracks, `mutedSegments` for time-based audio muting, and integration with iOS's `SecondaryAudioShouldBeSilentHint` system. **Critical finding: "muted" segments retain full audio data in the file - they are only flagged for playback suppression, creating an ideal covert data channel.**
Orchestration Session Log
This session orchestrated 13 parallel investigation agents to analyze Facebook iOS app v345.0 binary for evidence of surveillance behavior across 5 hypotheses.
SA-004 String Mining Report
This string mining reveals: 1. **Server-Controlled Audio Features** via MobileConfig flags 2. **Background Audio Infrastructure** with extensive controls 3. **Privacy Consent Bypass** mechanism via GateKeeper flags 4. **Kill Switch System** for remotely controlling feature availability
SA-005 Class Map Report
`./analysis/facebook/345.0/Facebook.app/Frameworks/FBSharedFramework.framework/FBSharedFramework`
SA-006 Key Derivation Analysis Report
Find the complete key derivation algorithm for `audioEncryptionKey` to enable H3 steganography decoding.
SA-008 XRay ML Model Analysis Report
Analyze the XRay ML model that processes audio embeddings and trace audio→embedding→network flow.
SA-016: Tray Visibility Control and Indicator Suppression Analysis
This analysis documents Facebook's Stories/Snacks tray visibility control system. The investigation reveals a sophisticated system for controlling when the stories tray is visible and how bucket reranking occurs based on visibility state. Key findings include: 1. **Multiple classes control tray visibility** with a coordinated observer/tracker pattern 2. **`_reRankBucketsWhenTrayIsNotVisible`** flag controls whether bucket reranking occurs when tray is hidden 3. **`privacyIndicatorUnit`** is a distinct component tied to feed story actions
SA-017 DRM and Encryption Key Provisioning Analysis Report
The Facebook iOS app implements a multi-layer DRM and encryption architecture: 1. **FairPlay DRM**: Apple's FairPlay Streaming (FPS) for video content protection 2. **License Management**: FBDrmLicenseLoader handles license fetching via GraphQL 3. **Key Hierarchy**: Separate key paths for DRM (video) vs E2EE (messaging attachments)
SA-018: FBMediaUploadManager Chunk-Based Upload Mechanism Analysis
This report documents the chunk-based media upload architecture used by Facebook's iOS application. The upload system implements a sophisticated segmented upload mechanism with support for video and audio content, featuring resume capabilities, progress tracking, and integration with the central dispatcher at address `0x12e5fa4`.
SA-010 Buffer Lifecycle Analysis Report
Trace complete audio buffer lifecycle from microphone capture to network transmission.
SA-023 Extended Steganographic Analysis Report
Generated: 2025-12-30T19:20:45.331700
SA-026: Live Frame Embedding Path Analysis
Analysis of the live audio-to-video embedding path reveals that **audio embedding into video frames occurs SERVER-SIDE, not during client-side recording**. The client binary contains only the EXTRACTION mechanism (`extractFromSample` shader). The client's role is to: 1. Capture audio via `FNFAudioQueue` and `FBCCAudioCapturer` 2. Process video frames through `FBVideoProcessor` 3. Apply filters and overlays (including audio-related overlays)
CMSampleBuffer Processing Analysis
`./analysis/facebook/345.0/Facebook.app/Frameworks/FBSharedFramework.framework/FBSharedFramework`
Ring Buffer Infrastructure Analysis
Audio Transcoding Infrastructure Analysis
`./analysis/facebook/345.0/Facebook.app/Frameworks/FBSharedFramework.framework/FBSharedFramework`
Review: Additional capture logs under `./analysis/facebook/`
Files reviewed (read-only):
Agent Handoff Document
strings /path/to/Facebook > strings_output.txt
Apple Security Disclosure Report
A critical privacy bypass has been discovered in the Facebook iOS application that circumvents Apple's microphone usage indicator (orange dot). Facebook pre-activates a CallKit-based bypass mechanism at application launch, allowing potential microphone access without user-visible indication. This bypass exploits iOS's trust model for CallKit-integrated VoIP applications, effectively defeating a core iOS privacy protection feature.
Apple Security Research Disclosure
This report documents critical privacy bypass vulnerabilities discovered in the Facebook iOS application (v345.0) that circumvent Apple's iOS privacy indicator system. These vulnerabilities enable the suppression of the microphone indicator (orange status bar dot) and camera indicator (green status bar dot) introduced in iOS 14, which are designed to inform users when applications access device sensors.
Executive Summary
This report documents a sophisticated privacy bypass in the Facebook iOS
Apple Security Research Submission Email Template
Through static binary analysis, I identified code paths in the Facebook iOS app that: 1. **Bypass the orange microphone indicator** by abusing CallKit framework methods (setAllowCallKitActiveAdjust:, _voipAudioSession, initWithAudioSessionHandsOff:) 2. **Bypass the green camera indicator** via hardcoded configuration (shouldShowGreenDotValue = FALSE)
Facebook iOS Binary Reverse Engineering: Complete Analysis Report
Based on comprehensive review of the existing reverse engineering work on the FBSharedFramework binary (Facebook iOS v345.0, 40.7 MB Mach-O arm64), here is a complete synthesis of the findings:
Binary Analysis Supplement
Binary analysis of FBSharedFramework reveals the architectural connection between UI shimmer components and audio session activation. The `FBFeedShimmeringStoryFlexComponentSpec::__internalFactory` function (0x000a57d8) and `FBSystemAudioSessionManager` audio setup code (0x000a0608) are located within **~5KB of each other**, indicating they exist in the same compilation unit and share an intentional architectural relationship. This explains the runtime observation that **scrolling the feed triggers massive audio capture bursts** while idle states show minimal activity.
Binary Audio-to-Analytics Evidence Chain
This document presents DIRECT binary evidence of audio data flowing into analytics and telemetry payloads within the Facebook iOS application. The analysis reveals: - **15 distinct functional stages** in the audio-to-network pipeline - **3 dual-handler functions** that process BOTH audio buffers AND network upload operations - **7-12 layer call depth** from microphone capture to server transmission
BINARY-GRAPHQL-AUDIO-CHAIN: Complete Audio Embedding Transmission Evidence
This document provides complete binary evidence of the audio capture to GraphQL transmission chain in Facebook iOS v345.0. The analysis traces from microphone activation through XRay ML embedding generation to GraphQL mutation network transmission, with all intermediate addresses and cross-reference counts.
BINARY-MQTT-AUDIO-CHAIN: Evidence of Audio Data Transmission via MQTT
This document compiles binary evidence demonstrating the infrastructure connecting audio capture functions to MQTT transmission mechanisms in the Facebook iOS application. The analysis reveals: 1. **MQTT sender classes with audio-related callers** at documented addresses 2. **Complete audio-to-network pathways** with call depths of 7-12 layers 3. **MQTT infrastructure integrated with background task management** for persistent operation
Category Spoofing Detection: PlayAndRecord Audio Session Proof
This capture proves Facebook iOS sets its AVAudioSession category to PlayAndRecord — the iOS category that enables simultaneous microphone input and speaker output — without any user-initiated audio activity (no calls, no voice messages, no Reels recording). The log monitors `AVAudioSession.setCategory` calls and tracks echo cancellation pointer configurations that are only meaningful during active microphone capture. The category switch occurs silently during normal feed browsing.
Chain of Audio Activation: Facebook iOS Shimmer-to-Audio Path Analysis
This document presents forensic evidence of hidden audio session activation triggered by innocent-looking UI shimmer placeholder components in Facebook iOS v345.0. The analysis reveals that displaying a loading animation ("shimmer") for the Stories tray initiates a chain of events culminating in `AVAudioSession` activation - **before any user interaction with audio/video content**.
FB Exposed Project
Investigation into Facebook's surveillance capabilities on iOS devices.
Comprehensive Instrumentation Capture v2
Second-generation comprehensive Frida instrumentation capturing audio pipeline activity, cryptographic operations, capture events, and AVAudioSession category changes simultaneously. This capture added category spoofing detection hooks absent in v1, producing the most complete single-session view of Facebook's audio surveillance infrastructure operating during passive feed browsing.
Evidence Packet: Cory Doctorow
Endpoint Evidence Review (Facebook iOS v345.0)
This file is intentionally conservative: it distinguishes **capability** (strings/classes/call graphs exist) from **behavior** (traffic observed during “passive browsing”).
ENDPOINT_EVIDENCE_REVIEW.md is superseded
`ENDPOINT_EVIDENCE_REVIEW.md` was written early with limited environment context and should be treated as **obsolete**.
Endpoint Evidence (Weeklong Summary, based on latest artifacts)
Endpoint Proof Table (Final, based on latest chain docs + on-device artifacts)
This file consolidates endpoint claims using the specific documents you referenced as the “latest” basis:
Facebook iOS v345.0 - Evidence Summary
Facebook iOS Surveillance Evidence Summary
| Metric | Count |
Execution Checklist: Achieving 95% Confidence
### H3 Steganography (71% → 95%) | Evidence | Impact | Status | |----------|--------|--------| | Infrastructure | +35% | ✓ Done | | Encryption key | +20% | [ ] Needed |
Review: `./analysis/facebook/evidence/` (What It Proves / What It Doesn’t)
This review is based on direct reading of files in:
Facebook iOS App v345.0 - Anti-Forensics & Covert Audio Analysis
Investigation revealed Facebook iOS app exhibits sophisticated anti-forensics behavior and contains evidence of covert audio handling capabilities. The app actively detects analysis tools and ceases network communication when monitored, resuming immediately when monitoring stops.
Facebook iOS App Security Analysis Report
This security analysis of the Facebook iOS application version 345.0 reveals a complex application with extensive permissions, multiple App Transport Security (ATS) exceptions, and deep integration with the Meta ecosystem (Instagram, WhatsApp, Messenger). The app implements certificate pinning for messaging security but allows insecure HTTP connections to specific Facebook infrastructure domains. The application requests comprehensive device permissions including background location access, which raises privacy concerns despite providing user-facing justifications. Deep analysis of the Hermes bytecode bundle reveals extensive GraphQL API surface with 100+ query/mutation endpoints, clipboard access patterns, device fingerprinting capabilities, and a comprehensive feature flag system with 20,000+ configuration parameters. The app includes 500+ NUX (New User Experience) triggers for user engagement and behavior tracking.
Untitled Report
Silent Listeners: How Facebook iOS Bypasses Privacy Indicators for Background Audio Surveillance
*Technical Analysis of Facebook iOS v345.0*
Untitled Report
Runtime Evidence Appendix
Runtime monitoring of the Facebook iOS app captured direct evidence of surveillance infrastructure including continuous polling of privacy indicator bypass state, over 1,000 accesses to telephony audio session without any active call, and aggressive background execution persistence.
Fact-Check Analysis: Documentation vs. Runtime Evidence
After reviewing all documentation against the latest runtime evidence, I've identified both **strongly verified claims** and **claims that require clarification or correction**. The core architectural findings are solid, but some claims overstate what the evidence directly proves.
Federal Law Enforcement Disclosure
Meta Platforms, Inc., through its Facebook iOS application, has implemented a technical mechanism that: 1. **Circumvents iOS Privacy Indicators:** Defeats Apple's microphone usage indicator (orange dot) designed to inform users of audio access 2. **Pre-emptive Bypass Activation:** Activates this bypass at application launch, before any user-initiated audio activity
FEDERAL LAW ENFORCEMENT DISCLOSURE
Federal Bureau of Investigation
Facebook iOS Binary Forensic Analysis Report
This forensic analysis of the Facebook iOS application binary reveals a complete technical infrastructure capable of: 1. **Audio capture** via microphone with deceptive permission handling 2. **Audio session spoofing** - declaring benign "Ambient" category while using "PlayAndRecord" 3. **Scroll-triggered audio activation** via FBFeedAudioSessionClient
Facebook iOS v345.0 Audio Infrastructure Analysis
Analysis of Facebook iOS app version 345.0 reveals a sophisticated audio session management infrastructure that activates in response to UI interactions, specifically shimmer loading animations in the feed. While no actual hardware microphone recording was detected during testing (AudioQueueNewInput = 0), the app maintains an aggressive audio session polling mechanism that could enable rapid microphone activation.
FEDERAL TRADE COMMISSION
For Electronic Filing via: https://reportfraud.ftc.gov/
Full Coverage Capture: 142 Targets, 15 Batches
Systematic coverage capture instrumenting all 142 identified surveillance-related function targets across 15 sequential batches. Each batch hooks ~10 functions to avoid detection threshold. This capture confirms that the full scope of identified targets are reachable at runtime — not dead code, not debug-only paths, but live production functions executing during normal app usage.
Steganography Decoding Analysis
After comprehensive analysis of extraction attempts and evidence files, this investigation reveals that **multiple extraction methods have successfully produced valid audio file structures** (54 validated files), but the audio content remains **unintelligible** due to encryption and/or proprietary codec encoding. The primary barrier is the `audioEncryptionKey` mechanism identified in the Facebook binary.
H5 Remote Control Analysis
Server-side flags can remotely activate audio capture without user consent
Audio Surveillance Gap Analysis - Facebook iOS v345.0
1. **Microphone Activation** (`startAudioCaptureWithEchoCancellationEnabled`) - 960 calls/session
Ghidra Analysis Review: Hook Recommendations Report
- **Purpose:** RTC notification handler entry point
Facebook iOS Upload Evidence Analysis Report
| Class | Fires | Percentage |
Agent Reports Index
| Hypothesis | Status | Threshold | Phase 4 | Runtime | Change |
JOURNALIST BRIEFING PACKET
Key Capture Logs Review (Redacted)
This note reviews the following files:
Latest Investigation Timeline + PCAP/Device-Log Correlation Playbook
This file intentionally prioritizes the **post-runtime** evidence path summarized in `evidence/agents/INDEX.md` over earlier time-boxed/partial reviews.
Next Steps to Produce “Transmission Proof” From PCAP + On-Device Logs
This is the shortest possible checklist to turn the repo’s **runtime mic-activation proof** into a **network-exfil proof** backed by PCAP citations.
EVIDENCE PACKET: FTC CONSENT DECREE VIOLATIONS BY META PLATFORMS, INC.
### The 2019 Consent Decree Requirement The 2019 FTC settlement with Facebook/Meta required: > "Facebook must obtain users' **affirmative express consent** before any sharing that materially exceeds the restrictions imposed by a user's privacy settings."
Master Tracking Spreadsheet
| Category | Count | |----------|-------| | Audio pipeline classes | 21 | | Buffer methods | 17 | | Encryption components | 14 |
FOR IMMEDIATE RELEASE
Facebook iOS App - Microphone Recording Evidence
60-Minute Passive Capture: 277,666 Events
The definitive passive capture session. The phone sat untouched for 60 minutes with Facebook open on the feed. No user interaction whatsoever — no scrolling, no taps, no audio playback. Despite this, the instrumentation recorded 277,666 events including 47,936 audio start operations. This capture is the strongest single piece of evidence that Facebook's audio infrastructure operates autonomously without user-initiated triggers.
`packet-capture/` PCAP Reality Check (What These Captures Do / Don’t Prove)
This is a narrow summary of the PCAPs currently present under `packet-capture/`, to avoid accidentally treating them as the “weeklong latest proof” captures.
Phase 2 Orchestration Session Log
| Agent ID | Code | Target | Status | Expected Impact |
Phase 2 Orchestration Summary
| Agent | Target | Grade | Key Finding |
Phase 3 Analysis Summary Report
Phase 3 focused on addressing the remaining blockers identified in Phase 2, with emphasis on: 1. Metal shader steganographic extraction algorithm 2. Speech/audio streaming infrastructure 3. DRM and encryption key provisioning 4. Remote configuration push mechanisms
Proxy Architecture: Bypassing Facebook Anti-Forensics
Facebook built `FBSSLKeyMaterialLogger` for debugging. We enable it to capture keys passively, then decrypt traffic offline.
PUBLIC DISCLOSURE: Facebook iOS Bypasses Privacy Indicators for Covert Audio Surveillance
| Finding | Evidence | Implication | |---------|----------|-------------| | Indicator bypass polling | 18 calls, every 3 seconds | Active monitoring of bypass state | | Telephony audio access | 1,099 accesses, 0 calls | VoIP infrastructure misuse | | Background persistence | 454 requests | Aggressive execution maintenance |
PyGhidra Investigation Targets for Facebook iOS Audio Exfiltration Analysis
``` 1. TRIGGER: User scrolls feed └── FBFeedShimmeringStoryFlexComponentSpec::__internalFactory (0x000a57d8) 2. ACTIVATION: Audio session activated
Facebook iOS Surveillance Disclosure Package
This package contains comprehensive documentation of a critical privacy vulnerability discovered in the Facebook iOS application that enables: 1. **Microphone indicator bypass** - Suppresses iOS orange dot during audio capture 2. **Camera indicator bypass** - Suppresses iOS green dot during video capture 3. **24/7 background audio capture** - Self-perpetuating background execution loop
Runtime Chains Summary
This document summarizes all runtime instrumentation evidence correlated across agent analyses.
Supplemental Runtime Evidence Log
This supplemental evidence documents **20,000+ audio capture calls** with the privacy indicator bypass active and **zero legitimate calls or RTC clients**. The evidence demonstrates a clear correlation between UI scrolling and audio capture bursts, with capture rates exceeding **6,000 captures per second** during active feed scrolling.
SA-003 Pattern Hunt Report
Analysis of the FBSharedFramework binary (40.7 MB Mach-O arm64) reveals extensive audio codec infrastructure but **no definitive evidence of steganographic embedding**. The byte patterns found are consistent with legitimate audio/video playback functionality rather than covert data encoding.
SA-013: Upload Dispatcher Decompilation Report
The function at `0x12e5fa4` is a **central Objective-C message dispatch stub** (objc_msgSend trampoline) that serves as the universal message routing mechanism for Facebook's entire upload infrastructure. It has **120,473 cross-references** throughout the binary, making it one of the most frequently called functions in the framework.
SSL Pinning Bypass & Gap-Closing Strategy
MOV_W0_0 = bytes([0x00, 0x00, 0x80, 0x52])
Frida Stalker Trace: 30 Hook Points
Stalker-based code tracing across 30 hook points in the Facebook binary. Unlike the passive captures which monitor function calls, Stalker traces instruction-level execution paths through the audio pipeline. This reveals the actual control flow between components — how a category change leads to a capture start, how captured buffers flow to the encryption layer, and how encrypted data reaches the network upload queue. Operated in stealth mode with jailbreak detection bypass.
Facebook Audio Steganography Evidence
Facebook iOS Surveillance Evidence - Submission Checklist
cd
SY-001 Evidence Correlation Report
This report cross-references all existing evidence to build complete proof chains for each surveillance hypothesis. The analysis reveals that **H1 (Microphone Capture)** now exceeds the 75% threshold, while **H2 (Indicator Suppression)** and **H5 (Remote Control)** have significantly strengthened but require targeted follow-up. **H3 (Steganography)** and **H4 (Network Exfiltration)** have advanced substantially but require live network captures and decoded audio verification for conclusive proof.
Trusted Contacts - Multi-Pronged Disclosure Strategy
Ghidra-Verified Function Targets: 83,368 Events
The culmination of the target verification pipeline. Each hooked function was first identified in Ghidra's decompilation output, then validated at runtime via Frida instrumentation. 83,368 total events across 5 capture batches over 26 minutes. Every function target in this capture has a corresponding Ghidra decompilation confirming its role in the audio/surveillance pipeline, providing the binary analysis ↔ runtime correlation required for forensic evidence.
SA-034 VoIP Push → Capture → Stream: Endpoint + Transport Extract
This note extracts only the endpoint/transport claims from SA-034 so it can be referenced as part of the “latest proof bundle” without re-reading the whole chain document.
Worker 4: Keyboard Surveillance Verification - COMPLETE
**Total Documentation:** 7 files, 890+ lines, 30.5K