With the iOS 18 update coming this fall, it’s as if Apple had adulterers in mind.
You can lock and even hide apps using Face ID – a feature many have called a ‘cheater’s paradise’.
I guarantee many hookups will ‘hide’ dating apps or preferred secret communication methods.
Scammers always find a way to hide, but not everyone is smart enough to know about all the tech clues their nefarious ways leave behind.
Now, before we get to the data… Snooping on someone else’s phone, computer or technology never ends well.
Is your spouse or partner always glued to their phone or computer? Maybe work is crazy right now, or they are busy chatting with someone (stock image)
Your best bet is an honest conversation with your partner.
It’s also a good idea to consult with an attorney before you start looking to make sure you’re not violating any federal or state laws.
With that in mind, here are the clues that your partner might be cheating:
Red flag: They never hung up
Is your spouse or partner always glued to their phone or computer? Maybe work is crazy right now, or they are busy chatting with someone.
Pay attention to how they behave with their devices. Many people keep their phones away from others to protect their privacy, but most do not hide their phones from their spouses. The same goes for shuffling browser tabs or turning off a tablet.
These subtle gestures may suggest that your partner is doing something they don’t want you to see. Is their phone always in their pocket? Do they change the code regularly and ‘forget’ to tell you what it is? Maybe they insist you’re not allowed to take or use their phone, period.
Notifications can also spot cheaters, so it’s common to turn them off or hide them if you’re doing something you don’t want your significant other to see.
Red flag: Fake applications
Unless your partner is cheeky, you won’t see a chat app on their home screen or loud messages sitting in their text message folder.
There are many apps for sharing messages, photos, videos and more that aren’t what they appear to be.
Calculator Pro+ is an example. It looks like a calculator, but it stores texts and call logs of secret contacts.

Radio show host Kim Komando offers tips to help people navigate the world of technology
Red flag: Their history is always hidden
Scammers would have to be stupid not to clear their browser’s search history.
If they routinely log into dating sites, secret email accounts, or anything else, they’ll probably consider covering their tracks.
The same goes for empty text message folders.
Red Flag: They’re Always ‘Working’
Fraudsters are known to create Google Docs online or Microsoft 365 files that look innocent until they are opened.
The file name could be, for example, ‘Third Quarter Goals’. When the file is opened, the first page appears to be a set of corporate speech.
But scrolling down reveals the true purpose of the file. Online documents are a secret way to share notes, photos and videos with someone else.
Red flag: They always visit that place
The history of the location is particularly revealing. Most cheaters know how to clear it, but not all. For Google users, the “previous destinations” menu option in the navigation system can describe your spouse’s movements.
If your spouse uses an iPhone, there’s a place you should definitely look. Many people don’t even know this tracking treasure exists.
● You can find an iPhone user’s frequent locations in Settings > Privacy & Security > Location Services > System Services > Important Locations. (It’s all the way to the bottom.)
It takes a lot of effort to constantly disable or delete these kinds of settings, so if they’re not good, you’re likely to find something. FYI, you may want to disable this feature on your phone if this practice bothers you.
Red flag: Their trash is full to the brim
Deleted digital items are usually never gone for good. A computer’s Recycle Bin or Recycle Bin stores items until the recycle bin is emptied. Some cloud services allow you to restore items from the recycle bin.
Deleted emails accumulate in the trash until it’s empty. Voicemails on an iPhone are hidden, but they can be retrieved. Apps deleted from a phone can also be restored. If you are using mobile operator services, voicemails may be available on their website.
A word of caution: Finding evidence of a fraud can be overwhelming. Make sure you take care of yourself during the process.