Skip to main content

Investigation Hypotheses

The investigation tests 5 hypotheses about Facebook iOS surveillance capabilities. Each hypothesis requires meeting a confidence threshold based on cumulative evidence.

Current Status

5 of 5 hypotheses have met their confidence threshold

5 MET 0 BELOW

H1: Microphone Capture

THRESHOLD MET

Facebook iOS can capture microphone audio without explicit user interaction

80%
85%
0%100%

Supporting Evidence

addendum-cmsamplebuffer-report

CMSampleBuffer Processing Analysis

`./analysis/facebook/345.0/Facebook.app/Frameworks/FBSharedFramework.framework/FBSharedFramework`

H1H4H6
addendum-ring-buffer-report

Ring Buffer Infrastructure Analysis

H1H2H4
addendum-transcoding-report

Audio Transcoding Infrastructure Analysis

`./analysis/facebook/345.0/Facebook.app/Frameworks/FBSharedFramework.framework/FBSharedFramework`

H1H4H6
agent-handoff-documentPhase 2

Agent Handoff Document

strings /path/to/Facebook > strings_output.txt

H1H2H4

H2: Indicator Suppression

THRESHOLD MET

The app can suppress iOS recording indicators (orange dot)

80%
92%
0%100%

Supporting Evidence

addendum-ring-buffer-report

Ring Buffer Infrastructure Analysis

H1H2H4
agent-handoff-documentPhase 2

Agent Handoff Document

strings /path/to/Facebook > strings_output.txt

H1H2H4
apple_security_disclosure

Apple Security Disclosure Report

A critical privacy bypass has been discovered in the Facebook iOS application that circumvents Apple's microphone usage indicator (orange dot). Facebook pre-activates a CallKit-based bypass mechanism at application launch, allowing potential microphone access without user-visible indication. This bypass exploits iOS's trust model for CallKit-integrated VoIP applications, effectively defeating a core iOS privacy protection feature.

H1H2
apple_security_disclosure_finalPhase 1

Apple Security Research Disclosure

This report documents critical privacy bypass vulnerabilities discovered in the Facebook iOS application (v345.0) that circumvent Apple's iOS privacy indicator system. These vulnerabilities enable the suppression of the microphone indicator (orange status bar dot) and camera indicator (green status bar dot) introduced in iOS 14, which are designed to inform users when applications access device sensors.

H1H2H4H5

H4: Network Exfiltration

THRESHOLD MET

Captured audio is transmitted to Facebook servers via covert channels

80%
88%
0%100%

Supporting Evidence

addendum-cmsamplebuffer-report

CMSampleBuffer Processing Analysis

`./analysis/facebook/345.0/Facebook.app/Frameworks/FBSharedFramework.framework/FBSharedFramework`

H1H4H6
addendum-ring-buffer-report

Ring Buffer Infrastructure Analysis

H1H2H4
addendum-transcoding-report

Audio Transcoding Infrastructure Analysis

`./analysis/facebook/345.0/Facebook.app/Frameworks/FBSharedFramework.framework/FBSharedFramework`

H1H4H6
additional_logs_review_category_spoof_and_crypto

Review: Additional capture logs under `./analysis/facebook/`

Files reviewed (read-only):

H4

H5: Remote Control

THRESHOLD MET

Server can remotely trigger audio capture without user action

80%
92%
0%100%

Supporting Evidence

apple_security_disclosure_finalPhase 1

Apple Security Research Disclosure

This report documents critical privacy bypass vulnerabilities discovered in the Facebook iOS application (v345.0) that circumvent Apple's iOS privacy indicator system. These vulnerabilities enable the suppression of the microphone indicator (orange status bar dot) and camera indicator (green status bar dot) introduced in iOS 14, which are designed to inform users when applications access device sensors.

H1H2H4H5
binary_reverse_engineering_report

Facebook iOS Binary Reverse Engineering: Complete Analysis Report

Based on comprehensive review of the existing reverse engineering work on the FBSharedFramework binary (Facebook iOS v345.0, 40.7 MB Mach-O arm64), here is a complete synthesis of the findings:

H1H2H4H5H6
binary-audio-analytics-chain
CRITICAL

Binary Audio-to-Analytics Evidence Chain

This document presents DIRECT binary evidence of audio data flowing into analytics and telemetry payloads within the Facebook iOS application. The analysis reveals: - **15 distinct functional stages** in the audio-to-network pipeline - **3 dual-handler functions** that process BOTH audio buffers AND network upload operations - **7-12 layer call depth** from microphone capture to server transmission

H1H2H4H5
binary-mqtt-audio-chainPhase 3
CRITICAL

BINARY-MQTT-AUDIO-CHAIN: Evidence of Audio Data Transmission via MQTT

This document compiles binary evidence demonstrating the infrastructure connecting audio capture functions to MQTT transmission mechanisms in the Facebook iOS application. The analysis reveals: 1. **MQTT sender classes with audio-related callers** at documented addresses 2. **Complete audio-to-network pathways** with call depths of 7-12 layers 3. **MQTT infrastructure integrated with background task management** for persistent operation

H1H4H5

H6: Covert Audio Transport

THRESHOLD MET

Audio data is transmitted through non-audio channels including analytics, GraphQL, MQTT, and pixel embedding

75%
82%
0%100%

Supporting Evidence

addendum-cmsamplebuffer-report

CMSampleBuffer Processing Analysis

`./analysis/facebook/345.0/Facebook.app/Frameworks/FBSharedFramework.framework/FBSharedFramework`

H1H4H6
addendum-transcoding-report

Audio Transcoding Infrastructure Analysis

`./analysis/facebook/345.0/Facebook.app/Frameworks/FBSharedFramework.framework/FBSharedFramework`

H1H4H6
audio-to-advertising-pipelineAPhase 2

AUDIO-TO-ADVERTISING-PIPELINE: Complete Evidence Chain

This document compiles forensic evidence proving that Facebook iOS integrates audio capture directly with advertising and analytics infrastructure. The audio capture mechanism is not isolated to legitimate use cases (calls, voice messages) but is architecturally coupled with Facebook's advertising targeting system.

H1H2H4H6
binary_reverse_engineering_report

Facebook iOS Binary Reverse Engineering: Complete Analysis Report

Based on comprehensive review of the existing reverse engineering work on the FBSharedFramework binary (Facebook iOS v345.0, 40.7 MB Mach-O arm64), here is a complete synthesis of the findings:

H1H2H4H5H6

About Confidence Thresholds

Each hypothesis has a specific confidence threshold based on the nature of the claim. All hypotheses use an 80% threshold for consistency. H6 (Covert Audio Transport) uses a 75% threshold as it represents capability rather than active exploitation. Confidence is calculated based on the cumulative weight of evidence from all related reports.