This is not an IT help desk gig.
I’m looking for someone who understands the real-world application of forensic tracking, counter-surveillance, and device hardening.
If you’re someone who takes pride in helping people out of complex, high-risk tech situations with integrity, I want to work with you.
Background:
I’ve been dealing with a web of unauthorized access to my personal devices and remote surveillance tied to my previous landlord. The situation is active, not hypothetical — and I’ve already begun working with cybercrime specialists.
Right now, I have all of my belongings isolated in a POD storage unit and I’m trying to remove any planted hardware before relocating. My phone is repeatedly picking up dozens of spoofed BLE devices, and I need help conducting a physical sweep as well as learning how to perform one myself.
This is a hands-on role. You must know how to dig deep and teach what you’re doing as you go.
———
What I Need Help With:
- Physical sweep to locate/remove BLE or hidden surveillance devices
- Teaching me how to perform sweeps using tools you recommend for this situation
- Auditing and hardening iPhone, Mac, and network setup
- Reviewing for backdoors, MITM behaviors, and BLE spoofers
- Helping remove or identify things like mobileconfig profiles, rogue certificates, firmware injections, and other traces of compromise
- Teaching me how to spot vulnerabilities, interpret logs using the devices you recommend, monitor signals, and stay ahead of future attacks
Having hands on experience with the following would be beneficial:
Experience with mobileconfig profiles, AirPlay/Bluetooth hijacking, packet sniffing, and MITM detection is a bonus
———
Firmware:
There are some devices that have been flashed with custom firmware, and behavior that suggests unauthorized firmware persistence.
I’m looking for someone who understands:
- Flashed or rogue firmware on consumer electronics
- BLE chipset behavior (ESP32, NRF52, AM335x, etc)
- Low-level backdoor vectors on smart controllers, or other IoT hardware
- How to detect, analyze, and remove or replace these backdoors safely
⸻
NDA & Work Agreement Required
Due to the nature of this case and the information involved, you must be willing to sign a non-disclosure agreement (NDA) and basic work agreement before beginning. This protects both sides and ensures confidentiality and accountability throughout the process.
If you’re not comfortable with that, this is not the right job.
⸻
Apply:
If this project interests you, please apply by responding with:
- Your background (formal or self-taught is fine)
- Experience with Bluetooth/RF tools (flipper zero, raspberry pi, ubertooth, wireshark, etc)
- Your availability this week
- Your desired pay *more below
———
Compensation:
This is a serious situation, and I’m fully prepared to compensate you appropriately for your time, expertise, and results. If you’re the right fit and can truly help resolve this, I will allocate whatever resources are necessary to get out of this compromised state, with a generous bonus if we successfully identify, remove, and harden everything.
Please include your:
- Hourly rate
- Flat project fee (if applicable)
- Or your typical pricing structure for work of this nature
I understand that working with someone in your position requires a high level of trust, and that bringing the wrong person into this type of situation could compromise my safety, privacy, or assets even further.
That said, I’ve already taken extensive precautions.
My most sensitive data, accounts, and assets are no longer accessible from this environment and are now handled securely by a third party.
So if your intention is to exploit or mislead, don’t waste your time & you won’t get anywhere.
Thank you!
Principals only. Recruiters, please don't contact this job poster.