03-Oct-2016, 21:55
None of this sounds even vaguely true. While I'm sure it is theoretically possible to use the bluetooth or wifi of your Phantom network as attack vectors via a hitherto unknown exploit, the effort and costs involved would require a very valuable target, and there would be much easier ways to run this attack.
At the end of this the result was, what - some files appeared? You reset the speaker and now suddenly you feel safe?
If you'd really been hacked with this level of sophistication, a root kit would have been installed and I wouldn't trust your computer at all without formatting it entirely. Even then, all bets are off.
Without any actual evidence like examples of these hidden files and/or analysis of their network activity to diagnose which nefarious activities they were undertaking, this seems like (at best) a misunderstanding of how the app works.
At the end of this the result was, what - some files appeared? You reset the speaker and now suddenly you feel safe?
If you'd really been hacked with this level of sophistication, a root kit would have been installed and I wouldn't trust your computer at all without formatting it entirely. Even then, all bets are off.
Without any actual evidence like examples of these hidden files and/or analysis of their network activity to diagnose which nefarious activities they were undertaking, this seems like (at best) a misunderstanding of how the app works.