For James Sexton, a lawyer specialized in divorces, Apple devices have become an involuntary but key tool to reveal secrets that, in many cases, lead to the dissolution of marriage.
“Divorce lawyers owe Steve Jobs,” he said during his participation in the ‘Diary of A CEO’ podcast, pointing to the decisive impact of synchronization between iPhone, iPad and other brand products.
Sexton explained that innovation introduced by Apple, far from limiting the life of users, It has generated a series of vulnerabilities that adulterers usually overlook.
“Your lover’s message appears on your child’s iPad because you did not realize that you had logged down with the same Apple ID,” he said, stressing that this type of errors, apparently trivial, have deep consequences. According to their experience, these situations are current currency in law firm: “This happens at least once a week.”

An iPhone or an iPad, designed to offer a fluid experience to the user, have turned out to be an invaluable resource for family lawyers. Automatic synchronization between devices linked to the same Apple accountallows any message or file sent from a device to be reflected in others, thus facilitating evidence without the need for hackeos or foreign passwords.
In this sense, Sexton said that most infidelity tests come from human errors associated with the misuse or ignorance of this technology.
From revealing messages to intimate photographseverything can be exposed if synchronization functions are not correctly deactivated. And unlike what could be thought, access to this information does not require any advanced technical knowledge: it reaches to open the family iPad.

Automatic synchronization, one of the features most celebrated by Apple users, It became a frequent source of incriminating evidence.
“Suddenly, your partner is reading the details of how the sex of yesterday was,” Sexton described, pointing out how carelessness can become an unintended confession. This type of revelations, which previously required extensive investigations, Now they emerge by themselves on a shared screen.
Far from being exceptional, these situations are common. The comfort offered by these systems, such as responding from any device or files between platforms, ends up blurring the limits between the private and shared.
According to Sexton, one of the main traps is the erroneous perception of privacy generated by personal devices. Many users believe that the use of a password or the physical possession of the device are sufficient guarantees to maintain their hidden communications.

However, In interconnected ecosystems such as Apple’sthis trust falls apart easily. The simple fact of having logged in to multiple teams with the same Apple ID can expose all the content in unsuspected places.
The feeling of security is reinforced by polished aesthetics and encryption promises, But practice demonstrates that the greatest vulnerability is in the lack of user’s knowledge.
Sexton remarked that an explicit message is not necessary to arouse suspicion: “Sometimes, it is not even the content of the message, but the name of the sender that arouses suspicion.”

Far from being isolated anecdotes, Cases linked to technological errors occur with an alarming regularity. Sexton said that “this happens at least once a week”, which demonstrates the sustained impact of technology on family legal procedures.
Devices, designed to facilitate daily life, They end up being a relentless mirror of the double life of some users.
The exhibition is not always immediate. Sometimes, an out of place message on the wrong device begins a chain of suspicions, reviews and discoveries that end up confirming the fact.