{"id":6728,"date":"2014-05-01T16:57:20","date_gmt":"2014-05-01T09:57:20","guid":{"rendered":"http:\/\/blog.flexispy.com\/?p=6728"},"modified":"2015-03-16T18:37:31","modified_gmt":"2015-03-16T11:37:31","slug":"flexispy-vs-mobistealth-ones-invisible-isnt","status":"publish","type":"post","link":"https:\/\/blog.flexispy.com\/ar\/flexispy-vs-mobistealth-ones-invisible-isnt\/","title":{"rendered":"FlexiSPY vs mobistealth | One\u2019s Invisible The Other Isn&#8217;t"},"content":{"rendered":"<h2><strong>Summary<\/strong><\/h2>\n<p><b>This article will clearly demonstrate why mobistealth\u2019s invisibility claim does NOT include keeping<i> you<\/i> hidden, by uncovering the place on an iPhone <span style=\"text-decoration: underline;\">where mobistealth can be seen<\/span> that will give you away every time.<\/b><\/p>\n<p>You will read a detailed explanation of how we tested the accuracy of mobistealth\u2018s claim that their cell phone monitoring software is undetectable on the target phone. We present the facts that clearly show which spy phone software only <i>says<\/i> it protects you from being found out and which one <i>actually delivers<\/i> <span style=\"text-decoration: underline;\">true<\/span> mobile monitoring invisibility.<\/p>\n<p>We explain our testing methodology and look at the test results using a commercially available copy of MobiStealth installed on an iPhone 4 and 5s.<\/p>\n<p>You\u2019ll see FlexiSPY\u2019s and mobistealth\u2018s anti-detection features compared for detectability, and why FlexiSPY is the best mobile phone monitoring application for anyone who wants to stay totally hidden.<\/p>\n<p><b><span style=\"text-decoration: underline;\">mobistealth Says Their Software Is 100% Undetectable<\/span><\/b><\/p>\n<p>What you see below is an actual screen grab from mobistealth\u2019s website where they claim their software is invisible. While it says right there: \u201c<i>No One Will Ever Know They Are Being Monitored<\/i>\u201d, the site doesn\u2019t warn you about the other ways mobistealth can be easily detected on the target phone.<\/p>\n<figure id=\"attachment_5286\" aria-describedby=\"caption-attachment-5286\" style=\"width: 592px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/i0.wp.com\/blog.flexispy.com\/wp-content\/uploads\/2014\/05\/ultimate-cell-phone-monitoring-software.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-5286 \" src=\"https:\/\/i0.wp.com\/blog.flexispy.com\/wp-content\/uploads\/2014\/05\/ultimate-cell-phone-monitoring-software.png?resize=592%2C281&#038;ssl=1\" alt=\"ultimate-cell-phone-monitoring-software\" width=\"592\" height=\"281\" \/><\/a><figcaption id=\"caption-attachment-5286\" class=\"wp-caption-text\">From the mobistealth website. They are clearly advertising as being hidden with the line &#8220;No One Will Ever Know They Are Being Monitored&#8221;<\/figcaption><\/figure>\n<p>While it is true that mobistealth hides the app icon on the target phone, what they don\u2019t tell you about are other traces created by a mobile spy app which will quickly show that the target phone is being monitored.<\/p>\n<p><b><span style=\"text-decoration: underline;\">Find mobistealth on an iPhone? It\u2019s Easy.<\/span><\/b><\/p>\n<p>Before explaining how we located the mobistealth software on the iPhone, we should first take a look at two important iPhone technical features that apply to any spy phone program. Spyphone developers have to be sure these features are properly designed if the software is to stay absolutely invisible.<\/p>\n<p>First, there are the application permissions found in the Settings menu. The second is the device\u2019s starting state: <i>jailbroken or not jailbroken<\/i>.<\/p>\n<p style=\"text-align: left;\">If you\u2019re not exactly sure what<i> jailbreaking<\/i> is, the idea is simple: If you want to install a mobile phone spying app on an iPhone, it\u2019s necessary to get special access that allows you to install the programs you want to use, or \u201cjailbreak\u201d the device. Later in the article you\u2019ll see what happens on the iPhone when you do this, and how it can get you discovered. First, let\u2019s look at Permissions.<\/p>\n<p><b><span style=\"text-decoration: underline;\">Application Permissions will get you discovered<\/span><\/b><\/p>\n<p>When an application which is running on an iPhone has to <b>send data<\/b>, use the<b> GPS<\/b> or <b>microphone<\/b>, it must first get special permission from the phone\u2019s operating system.<\/p>\n<p>These permissions are displayed in the iPhone\u2019s Settings menus as shown below:<\/p>\n<ul>\n<li><b>Settings &gt; Cellular<\/b><\/li>\n<li><b>Settings &gt; Location Services<\/b><\/li>\n<li><b>Settings &gt; Microphone<\/b><\/li>\n<\/ul>\n<p><b> <\/b>If you simply tap open any of these menus you can see the name of the application requesting the permissions.<\/p>\n<p>This is a sure giveaway that monitoring software has been installed on the iPhone and is one of the first places someone searching for spy phone software will check.<\/p>\n<p>When we tested our copy of mobistealth, their software did indeed stay hidden in the <b>location services<\/b> and <b>cellular<\/b> permissions menus. And although it also did not appear in <b>Settings &gt; Microphone,<\/b> we found that this was only because the audio recording feature mobistealth offers as part of their software failed to work. Therefore we could not determine for sure whether mobistealth is visible in <b>Settings &gt; Microphone<\/b>, even if the feature can be made to function as advertised. But digging a little further we uncovered something about the associated function that makes the question of invisibility in this menu a moot point.<\/p>\n<p>The SMS message command needed to activate remote audio recording could actually be seen, giving the target phone\u2019s user a clear sign that mobistealth has been installed.<\/p>\n<p>FlexiSPY removes this detection risk by making sure our software is always hidden in the Permissions menus, and that remote command text messages are never visible on the target phone.<\/p>\n<p>As simple as these invisibility threats are to find, there\u2019s an even easier way to detect a mobile monitoring app on a cell phone.<\/p>\n<p><b>Jailbreaking can ruin invisibility <\/b><\/p>\n<p>Before you install any software the iPhone will be in one of two states:<\/p>\n<p>Either the target phone is <b>NOT YET jailbroken<\/b> or it is <b>ALREADY jailbroken<\/b>.<\/p>\n<p>Once you install spy software on a cell phone, you have to be sure there is no sign on the target phone that indicates anything has been changed internally. And this is how one small but crucial detail will give you away\u2013 any time a mobile phone is jailbroken, an icon labeled \u201cCydia\u201d appears in the app directory.<\/p>\n<p>So in order for a mobile monitoring app to be 100% hidden, the following two conditions must be met at the time of installation:<\/p>\n<p>&#8211; If the mobile phone was not previously jailbroken,<i> the Cydia icon must not be visible<\/i>.<\/p>\n<p>&#8211; If it\u2019s already jailbroken,<i> the existing installation package list must not show any changes. <\/i><\/p>\n<h2 style=\"text-align: left;\"><strong>Phone NOT jailbroken a detection risk<\/strong><\/h2>\n<figure id=\"attachment_5291\" aria-describedby=\"caption-attachment-5291\" style=\"width: 235px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/i0.wp.com\/blog.flexispy.com\/wp-content\/uploads\/2014\/05\/The-Cydia-Icon.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-5291\" src=\"https:\/\/i0.wp.com\/blog.flexispy.com\/wp-content\/uploads\/2014\/05\/The-Cydia-Icon.png?resize=235%2C339&#038;ssl=1\" alt=\"This Cydia Icon is definitely going to look strange to the owner of the phoneThis Cydia Icon is definitely going to look strange to the owner of the phone\" width=\"235\" height=\"339\" \/><\/a><figcaption id=\"caption-attachment-5291\" class=\"wp-caption-text\">This Cydia Icon is definitely going to look strange to the owner of the phone<\/figcaption><\/figure>\n<p>The below grab from an iPhone <b>that was not jailbroken<\/b> before mobile monitoring software was installed clearly shows the Cydia icon in the app directory just as it looks on the target device. That icon\u2019s sudden appearance is more than likely to attract attention and raise suspicion that the device is being remotely monitored.<\/p>\n<p>Solving the Cydia icon problem is a simple matter of designing the software so that the Cydia icon can be removed, but mobistealth\u2019s software doesn\u2019t include any such feature.<\/p>\n<p><b><span style=\"text-decoration: underline;\">Phone ALREADY jailbroken causes suspicion <\/span><\/b><\/p>\n<p>On an already-jailbroken iPhone, the presence of the Cydia icon will already be familiar to the person using it, but what <i>will<\/i> make them suspicious is the sudden appearance of an unknown installation package. And this is exactly what happens because mobistealth puts an additional Installation Package called <b>SBTerminal<\/b> onto the iPhone.<\/p>\n<p>Here below you can see that their Installation Package listing is plainly visible in the Sources menu. This is an obvious red flag that will quickly draw attention to the fact that mobistealth\u2019s software is running on the target phone:<\/p>\n<p>Although it\u2019s actually quite simple to tap and delete the tell-all listing, many people are not aware of this. But with FlexiSPY there\u2019s nothing to tap away, because our software automatically deletes the package source once the installation is complete.<\/p>\n<figure id=\"attachment_5301\" aria-describedby=\"caption-attachment-5301\" style=\"width: 267px\" class=\"wp-caption alignright\"><a href=\"https:\/\/i0.wp.com\/blog.flexispy.com\/wp-content\/uploads\/2014\/05\/vyk.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-5301\" src=\"https:\/\/i0.wp.com\/blog.flexispy.com\/wp-content\/uploads\/2014\/05\/vyk.png?resize=267%2C402&#038;ssl=1\" alt=\"Here's MobiStealth being shown at vyk.. \" width=\"267\" height=\"402\" \/><\/a><figcaption id=\"caption-attachment-5301\" class=\"wp-caption-text\">Here&#8217;s mobistealth being shown at vyk..<\/figcaption><\/figure>\n<p>How did we identify \u201cvyk.me\u201d as mobistealth? It clearly is not a trusted app like Twitter, nor is it part of the iPhone\u2019s software like Maps. Plus\u2014 we made sure that no other software besides mobistealth was installed after jailbreaking our test phone\u00ad.<\/p>\n<p><strong>Our finding: You <i>can<\/i> detect mobistealth on an iPhone<\/strong><\/p>\n<p>mobistealth claims on their website \u201cNo One Will Ever Know They Are Being Monitored\u201d, but what this actually means is their software runs without displaying an icon. Our point is that \u201cno icon\u201d <span style=\"text-decoration: underline;\">is not a guarantee of absolute concealment,<\/span> because there are other clear signs of mobistealth on the iPhone.<\/p>\n<p>Our advice to mobistealth customers: get that Cydia icon hidden if you don\u2019t want to get discovered.<\/p>\n<p>We show you <span style=\"text-decoration: underline;\">here<\/span> how FlexiSPY lets you do this with just one click.<\/p>\n<p>mobistealth\u2018s claim that \u201cNo One Will Ever Know They Are Being Monitored\u201d doesn\u2019t actually say it will keep you fully concealed. The true test of any mobile phone monitoring software is strictly pass\/fail \u2014 it either keeps you hidden from the phone\u2019s owner, or allows you to be detected.<\/p>\n<p><b><\/b><strong>What this all means to you<\/strong><\/p>\n<p>Seen from the developer\u2019s viewpoint, spyphones should be called \u201cMonitoring Concealment\u201d apps, because a properly designed spyphone will have invisibility in all areas of the target phone as its top priority. So for someone who needs powerful mobile phone monitoring capabilities and the assurance they will never be detected, the facts confirm it: FlexiSPY hides the app and keeps you concealed.<\/p>\n<h2><strong>Appendix<\/strong><\/h2>\n<p>Below you can find the detailed specifications of MobiStealth.<\/p>\n<figure id=\"attachment_5307\" aria-describedby=\"caption-attachment-5307\" style=\"width: 539px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/i0.wp.com\/blog.flexispy.com\/wp-content\/uploads\/2014\/05\/Chart.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-5307\" src=\"https:\/\/i0.wp.com\/blog.flexispy.com\/wp-content\/uploads\/2014\/05\/Chart.png?resize=539%2C313&#038;ssl=1\" alt=\"MobiStealth Specs \" width=\"539\" height=\"313\" \/><\/a><figcaption id=\"caption-attachment-5307\" class=\"wp-caption-text\">For reference, this chart shows the specifications of mobistealth used in our tests.<\/figcaption><\/figure>\n<p>Stay tuned for further blog pieces as we face-off FlexiSPY against all other major spy phone competitors to show that, when we say FlexiSPY really is the best spy phone software and really is 100% undetectable once installed, we have the evidence to prove it.<\/p>\n<p>You can see how FlexiSPY stacked up against the remaining competitors for software visibility by clicking the links below.<\/p>\n<ul>\n<li><a href=\"https:\/\/blog.flexispy.com\/flexispy-vs-mspy\/\"><b>mspy<\/b><\/a><\/li>\n<li><a href=\"https:\/\/blog.flexispy.com\/flexispy-vs-stealthgenie\/\"><b>stealthgenie<\/b><\/a><\/li>\n<li><b><a href=\"https:\/\/blog.flexispy.com\/flexispy-vs-mobile-spy\/\">mobile spy<\/a><br \/>\n<\/b><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Summary This article will clearly demonstrate why mobistealth\u2019s invisibility claim does NOT include keeping you hidden, by uncovering the place on an iPhone where mobistealth can be seen that will give you away every time. You will read a detailed explanation of how we tested the accuracy of mobistealth\u2018s claim that their cell phone monitoring [&hellip;]<\/p>\n","protected":false},"author":21,"featured_media":10753,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[130],"tags":[],"class_list":["post-6728","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-scam-report"],"_links":{"self":[{"href":"https:\/\/blog.flexispy.com\/ar\/wp-json\/wp\/v2\/posts\/6728","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.flexispy.com\/ar\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.flexispy.com\/ar\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.flexispy.com\/ar\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.flexispy.com\/ar\/wp-json\/wp\/v2\/comments?post=6728"}],"version-history":[{"count":0,"href":"https:\/\/blog.flexispy.com\/ar\/wp-json\/wp\/v2\/posts\/6728\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.flexispy.com\/ar\/wp-json\/wp\/v2\/media\/10753"}],"wp:attachment":[{"href":"https:\/\/blog.flexispy.com\/ar\/wp-json\/wp\/v2\/media?parent=6728"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.flexispy.com\/ar\/wp-json\/wp\/v2\/categories?post=6728"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.flexispy.com\/ar\/wp-json\/wp\/v2\/tags?post=6728"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}