If core code has been entered into a computer.. That one initial computer’s information: Through ICLOUD, games, address book, and other apps., giving the hacker who entered the code directly — now has complete control over permissions. The ability to see everything you’re doing, planning, whom you speak with, personal photographs. Please tell me how do you get them out for good. If they have the serial number info, etc. Apple is made to be hacked.