BREAKING INTO The HACKERS iPHONE and Exploring Abandoned Mystery Evidence (YouTube Hacker FaceTime) - Summary

Summary

In this video, the narrator and his friends are attempting to unlock a stolen Tesla phone using various methods such as fingerprints and phone data. They've discovered that the phone belongs to a hacker who has been spying on them. The group is particularly concerned about a Uber driver app on the phone, as they've been using Uber frequently and suspect the hacker may be driving their rides.

The narrator also mentions a text message from a person named 'PZ4', who seems to know a lot about the group's activities. They decide to respond to the text, pretending to be 'PZ4', and ask if they're still on the mission. After this, they plan to move the conversation to their Instagram channels to continue the discussion.

The video ends with a call to action for viewers to subscribe to their channels and follow them on Instagram.

Facts

1. The speaker found a phone that was stolen from a Tesla and is trying to unlock it using fingerprints collected throughout a series of adventures. [Source: Document 1]
2. The phone belongs to the hacker who stole the Tesla, but the speaker couldn't unlock it. [Source: Document 1]
3. The speaker is using all the fingerprints that they've been collecting throughout their adventure. [Source: Document 1]
4. The speaker believes they are not the hacker, but some people in the comments section thought they were. [Source: Document 1]
5. The speaker placed a tracking device in the pocket of the person who was suspected of being the hacker. [Source: Document 1]
6. The speaker is trying to unlock the phone using fingerprints stored in their book. [Source: Document 1]
7. The speaker is trying to unlock the phone using the fingerprint found on the glass jars in their house. [Source: Document 1]
8. The speaker is trying to unlock the phone using the fingerprint found inside the Tesla. [Source: Document 1]
9. The speaker managed to unlock the phone using the fingerprint found inside the Tesla. [Source: Document 2]
10. The person who stole the Tesla and left their phone behind is working with the hacker. [Source: Document 2]
11. The speaker found a text message from the hacker on the phone. [Source: Document 2]
12. The speaker is considering responding to the text message but is worried it might be a trap. [Source: Document 2]
13. The speaker is considering using a hack to cover their face when looking at the phone. [Source: Document 2]
14. The speaker found an Amazon app on the phone with items in the cart. [Source: Document 3]
15. The speaker found a book on how to hack on the phone. [Source: Document 3]
16. The speaker received another text message from the hacker. [Source: Document 3]
17. The speaker decided to respond to the text message, pretending to be the hacker. [Source: Document 3]
18. The speaker is considering moving the conversation to their own channel. [Source: Document 3]