
I found a secret iPhone folder that could expose bad habits, financial info & cheating – deleting it saved my storage
YOUR smartphone is like an electronic mirror - it can reveal all sorts about who you are, who you're close to and what your interests are.
But I found a secret folder recently that could expose more about me than I'd like to admit. It's quite spooky.
Apple introduced a dedicated Screenshots album in iOS 9, all the way back in 2015.
Somehow, I've only just discovered it - and with the sheer size of it, there's no wonder my storage is always full.
It's tucked away in Photos, and the most recent iOS 18 design makes it even more hidden.
Strings of screenshots of wedding guest dresses, confirmation pages following shopping orders and ticket bookings, to (and I hate to admit this) my own bank details - this album of images is incredibly personal.
It acts as a chunky dossier of my social media scrolling, internet browsing, social life - and all my bad habits.
All the Instagram profiles I've screenshotted, messages I've shared for my friends to weigh in on, to my own financial information that is ripe for hackers - it's all there.
Whenever you screenshot something on your iPhone, that snap is automatically transported to its own, exclusive folder.
Where these images are usually camouflaged in your wider Photos album, they are truly laid bare in the Screenshots folder.
I had nearly 3,700 screenshotted images inside this hidden folder - that's roughly 2GB in storage.
You might even be able to call me a digital hoarder - an emerging "dark side of technology" which can fuel anxiety and stress levels, according to a recent study.
Apple shows you tips and tricks on the new Iphone 16e with Apple Intelligence
But doing so is not only eating into my storage, it poses a huge security risk too.
Interestingly, considering how much it reveals about me, this sneaky folder may even be used to catch out a cheating partner.
4
Save storage
By deleting all my screenshots - spanning nearly a decade - I managed to reclaim storage back.
Unlike your main photo library, the Screenshots album gives you the option to Select All - so deleting every snap in one swoop is easy.
If you want to wipe all screenshots, tap Select in the top-right, then hit Select All in the top-left.
Once everything's highlighted, tap the bin icon and confirm.
While you may find it hard to let go of some images - 'just in case' you might need them later - remember that some of these screenshots may pose a security risk.
Security risk
If you're an avid online shopper or digital banking user like me, then your screenshots could pose a security risk for your accounts.
Some snaps may expose sensitive information, such as financial details or passwords.
Even information that could be used for phishing scams, such as my name, email and postal address, can be in these screenshots.
This is yet another reason to let go of those pesky screenshots you never revisit or reopen.
Now, here's the part some people miss.
When you delete a screenshot - or any image for that matter - it's not fully gone.
The image quietly moves to the Recently Deleted album for up to 30 days before it is automatically removed.
If you want it gone for good - and you want to free up space immediately - then go into the Recently Deleted album, select the screenshots again, and hit Delete.
Caught out
Now, I know that you could learn a lot about me from my Screenshots folder - meaning you could probably extract a lot of information about someone else from theirs.
This hidden folder, therefore, could be an obscure but easy way to catch out a cheater.
Anyone can delete texts or WhatsApp messages - however, there might be a trace of infidelity hidden in their screenshots.
Be it from screenshots of someone's recent Instagram photo, or perhaps confirmation of a dinner reservation you weren't privy to.
Four red flags your partner is cheating
Private Investigator Aaron Bond from BondRees revealed four warning signs your partner might be cheating.
They start to take their phone everywhere with them
In close relationships, it's normal to know each other's passwords and use each other's phones, if their phone habits change then they may be hiding something.
Aaron says: "If your partner starts changing their passwords, starts taking their phone everywhere with them, even around the house or they become defensive when you ask to use their phone it could be a sign of them not being faithful."
"You should also look at how they place their phone down when not in use. If they face the phone with the screen facing down, then they could be hiding something."
They start telling you less about their day
When partners cheat they can start to avoid you, this could be down to them feeling guilty or because it makes it easier for them to lie to you.
"If you feel like your partner has suddenly begun to avoid you and they don't want to do things with you any more or they stop telling you about their day then this is another red flag."
"Partners often avoid their spouses or tell them less about their day because cheating can be tough, remembering all of your lies is impossible and it's an easy way to get caught out," says Aaron.
Their libido changes
Your partner's libido can change for a range of reasons so it may not be a sure sign of cheating but it can be a red flag according to Aaron.
Aaron says: "Cheaters often have less sex at home because they are cheating, but on occasions, they may also have more sex at home, this is because they feel guilty and use this increase in sex to hide their cheating. You may also find that your partner will start to introduce new things into your sex life that weren't there before."
They become negative towards you
Cheaters know that cheating is wrong and to them, it will feel good, this can cause tension and anxiety within themselves which they will need to justify.
"To get rid of the tension they feel inside they will try to convince themselves that you are the problem and they will become critical of you out of nowhere. Maybe you haven't walked the dog that day, put the dishes away or read a book to your children before bedtime. A small problem like this can now feel like a big deal and if you experience this your partner could be cheating," warns Aaron.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Reuters
32 minutes ago
- Reuters
Haveli Investments to buy AI database firm Couchbase for about $1.5 billion
June 20 (Reuters) - Haveli Investments will acquire Couchbase (BASE.O), opens new tab for about $1.5 billion, the companies said on Friday, as the private equity firm looks to capitalize on the artificial intelligence-focused database company's platform. Couchbase's shares, which have gained 21% this year, were up 29% in early trading following the news. The company's cloud-based database powers AI-related applications that need a flexible data model and easy scalability. Couchbase is part of a group of modern database companies — including MongoDB (MDB.O), opens new tab, Cockroach Labs, Snowflake (SNOW.N), opens new tab and Databricks — challenging legacy players such as Oracle (ORCL.N), opens new tab. New database technologies make it easier and faster to store, manage and use a large amount of unstructured data that modern AI systems require. Haveli Investments, founded by former Vista Equity Partners president Brian Sheth, will pay Couchbase shareholders $24.50 per share, which represents a premium of about 29% to the stock's last close price. The private equity firm has a 9.6% stake in Couchbase, according to data compiled by LSEG. It may engage with Couchbase's management or board to explore strategic options, including a potential merger, according to a March filing with the U.S. SEC. The agreement includes a go-shop period that ends on Monday, during which Couchbase can consider alternate offers.


Metro
an hour ago
- Metro
16,000,000,000 Google, Apple and Facebook passwords leaked in major breach
Sixteen billion passwords to social media accounts and were leaked what has been described as one of the largest ever breaches, it's reported. The global breach exposed login credentials and passwords to Apple, Facebook, Google and other social media account as well as governments services, according to a report published by Forbes. Google has urged its billions of users to update their passwords, while the FBI is warning people to be careful before clicking on links in SMS messages. Researchers at Cybernews, which has been investigating the leak, said it found '30 exposed datasets containing from tens of millions to over 3.5 billion records each.' They said only one of them had previously been reported as being exposed. The team warned: 'This is not just a leak – it's a blueprint for mass exploitation. 'With over 16 billion login records exposed, cybercriminals now have unprecedented access to personal credentials that can be used for account takeover, identity theft, and highly targeted phishing.' They continued: 'These aren't just old breaches being recycled, this is fresh, weaponisable intelligence at scale.' Cyber News called it 'one of the largest data breaches in history'. It's thought the breach comes from various sources, including credential stuffing lists, stealer malware, and repackaged past leaks. According to the researchers, the datasets were only exposed very briefly, enough time for them to be found by the team but not enough time for them to find out who was controlling the data. Chris Linnell, associate director of data privacy at cyber security firm, Bridewell, described the breach as 'serious' as it potentially gave attackers access to multiple services. He added that under data protection laws, such as the UK GDPR, individuals usually have the right to be informed about breaches that pose a high risk to their rights and freedoms. They should also be told what steps are being taken to mitigate the impact. 'However, because the source of this breach is currently unknown, it may be difficult for affected individuals to receive specific guidance or seek direct recourse. 'In the meantime, the most effective course of action is to focus on preventing any further impact through proactive security measures.' He advised anyone concerned they might have been impacted by the breach to check their devices for malware using reputable antivirus or anti-malware software. 'Run a full system scan and follow the software's guidance to quarantine or remove any threats,' he said. 'Ensure your operating system and applications are up to date, as software updates often include critical security patches. If malware is detected, consider resetting your device to factory settings after backing up essential data, and reinstalling only trusted applications.' Chris said it's vital to use strong, unique passwords for each of your online accounts. 'Avoid reusing passwords across services, as a breach in one can compromise others. A password manager can help generate and securely store complex passwords, reducing the risk of human error,' he explained. More Trending 'Additionally, enable multi-factor authentication (MFA) wherever possible – this adds an extra layer of protection even if your password is compromised.' He also urged people to look out for signs of fraud. 'Use dark web monitoring tools to check if your credentials have been exposed and monitor your bank and credit card statements regularly for unauthorised transactions. 'Staying proactive can help mitigate the impact of a breach particularly when potential fraud is involved.' Get in touch with our news team by emailing us at webnews@ For more stories like this, check our news page. MORE: Google, Spotify and YouTube down for tens of thousands of users worldwide MORE: Stormzy set to make film debut with major career move MORE: 'Stupid' Apple Pay prank plagues commuters on London Tube


Coin Geek
an hour ago
- Coin Geek
Top BSV wallets? Kurt Wuckert Jr. answers in AMA
Homepage > Videos > Top BSV wallets? Kurt Wuckert Jr. answers in AMA In this CoinGeek Weekly Livestream episode, Wuckert covered the best BSV wallets, upcoming BSV conferences, and a general BSV roundup for 2025 so far. Click here to read the full article.