The 'affair mode' phone settings that all cheaters use: I knew my partner was up to something... here's how I cracked his secret code and uncovered all his dirty antics

Daily Mail
ANALYSIS 29/100

Overall Assessment

The article sensationalizes personal betrayal using emotionally charged language and a true-crime narrative style. It frames common privacy tools as 'cheating enablers' without balanced discussion of their legitimate uses. Sourcing is thin and anecdotal, with no effort to present diverse perspectives on digital privacy.

"Her unfaithful man went to even greater lengths to conceal his deceit, using unorthodox tactics to hide the depths of his betrayal."

Loaded Language

Headline & Lead 25/100

The headline and lead prioritize emotional engagement over factual reporting, using dramatic language and personal narrative to frame the topic as scandalous rather than informative.

Sensationalism: The headline uses emotionally charged language like 'affair mode' and 'dirty antics' to provoke outrage and curiosity rather than inform neutrally.

"The 'affair mode' phone settings that all cheaters use: I knew my partner was up to something... here's how I cracked his secret code and uncovered all his dirty antics"

Loaded Language: Phrases like 'cracked his secret code' and 'dirty antics' frame the subject as a villain in a spy narrative, not a news report.

"here's how I cracked his secret code and uncovered all his dirty antics"

Narrative Framing: The headline and lead are structured like a true-crime exposé, focusing on personal betrayal rather than technological privacy features.

"I knew my partner was up to something... here's how I cracked his secret code"

Language & Tone 20/100

The tone is heavily biased toward moral outrage, using emotionally manipulative language and framing privacy technology as inherently deceptive.

Loaded Language: The article repeatedly uses judgmental terms like 'unfaithful man', 'deceit', and 'betrayal', which inject moral condemnation.

"Her unfaithful man went to even greater lengths to conceal his deceit, using unorthodox tactics to hide the depths of his betrayal."

Appeal To Emotion: Quoting the betrayed partner’s self-blame ('How could I be so dumb?') exploits emotional vulnerability for dramatic effect.

"How could I be so dumb?"

Editorializing: The article frames privacy tools as inherently suspicious, implying misuse is the norm rather than a possibility.

"These features weren't necessarily designed for extramarital deception. Many exist for security and convenience, but when combined, they can create a phone that appears ordinary while quietly concealing nefarious activity."

Balance 40/100

Sources are limited to a single anecdote and a tech personality, with vague references to unnamed professionals, undermining balance and credibility.

Proper Attribution: The article attributes claims to a named tech expert, Kim Komando, who is a known public figure in consumer tech advice.

"Tech expert Kim Komando, who specializes in consumer technology, digital security and internet advice, has revealed all the secret 'affair mode' settings and how to discover them on your partner's phone."

Vague Attribution: The term 'relationship therapists and divorce attorneys have even started calling it 'affair mode'' lacks specific sourcing or evidence of widespread professional usage.

"Relationship therapists and divorce attorneys have even started calling it 'affair mode.'"

Cherry Picking: Only one anecdotal case (Kerry/Kelly — name inconsistency noted) is used to generalize about cheating behavior, with no counter-perspectives from privacy advocates or technologists.

"Kerry told Daily Mail the turning point came when entire message threads she had previously seen simply stopped appearing."

Completeness 30/100

The article omits critical context about digital privacy rights and alternative uses of the technology, presenting a narrow, accusatory narrative.

Omission: The article fails to mention legitimate uses of disappearing messages and hidden apps (e.g., domestic abuse survivors, privacy protection), creating a one-sided view.

Misleading Context: While noting that features 'weren't necessarily designed for extramarital deception,' the article overwhelmingly frames them as tools for cheating.

"These features weren't necessarily designed for extramarital deception. Many exist for security and convenience, but when combined, they can create a phone that appears ordinary while quietly concealing nefarious activity."

Selective Coverage: Focuses exclusively on how privacy tools can hide infidelity, ignoring broader societal debates about digital privacy, consent, and surveillance in relationships.

AGENDA SIGNALS
Technology

Privacy Tools

Beneficial / Harmful
Dominant
Harmful / Destructive 0 Beneficial / Positive
-9

framed as harmful enablers of deception

The article consistently frames disappearing messages, hidden apps, and location concealment as tools designed to facilitate cheating, despite acknowledging their legitimate uses. The term 'affair mode' itself pathologizes standard privacy features.

"These features weren't necessarily designed for extramarital deception. Many exist for security and convenience, but when combined, they can create a phone that appears ordinary while quietly concealing nefarious activity."

Society

Relationships

Stable / Crisis
Strong
Crisis / Urgent 0 Stable / Manageable
-8

framed as inherently unstable and prone to digital betrayal

The narrative constructs romantic relationships as battlegrounds of suspicion and surveillance, where betrayal is technologically enabled and discovery is a forensic act. The tone implies widespread crisis in trust.

"Cheaters are becoming more technologically savvy than ever, turning to hidden phone settings, disappearing messages and location tricks to conceal their tracks."

Culture

Public Discourse

Legitimate / Illegitimate
Strong
Illegitimate / Invalid 0 Legitimate / Valid
-8

framed as morally compromised by digital secrecy

The article promotes a narrative where normal privacy practices are equated with moral failure, suggesting that using encryption or hidden apps is prima facie evidence of wrongdoing, thus delegitimizing private communication in relationships.

"The calculator that isn't No one needs two calculators. Calculator Pro+, Calculator Vaul, and Secret Calculator look exactly like the built-in calculator app. Enter a secret PIN, and they open into a hidden photo vault, private messaging app, or secret call log."

Technology

Big Tech

Trustworthy / Corrupt
Strong
Corrupt / Untrustworthy 0 Honest / Trustworthy
-7

framed as enabling deceit through opaque design

By highlighting how built-in features (e.g., Significant Locations, hidden apps) can be exploited without consent, the article implies tech companies are complicit in facilitating infidelity by making surveillance evasion easy.

"On iPhone: Go to Settings > Privacy & Security > Location Services > System Services > Significant Locations. Your phone will likely request Face ID. Once inside, you'll find a detailed history showing where that device has traveled, organized by city and date, often including exact addresses and timestamps."

Identity

Individual

Included / Excluded
Notable
Excluded / Targeted 0 Included / Protected
-6

framed as isolated and vulnerable to betrayal

The use of personal testimony ('How could I be so dumb?') and the focus on unilateral discovery (spying on a partner) positions individuals as powerless victims in relationships, fostering a sense of exclusion and distrust.

"How could I be so dumb?"

SCORE REASONING

The article sensationalizes personal betrayal using emotionally charged language and a true-crime narrative style. It frames common privacy tools as 'cheating enablers' without balanced discussion of their legitimate uses. Sourcing is thin and anecdotal, with no effort to present diverse perspectives on digital privacy.

NEUTRAL SUMMARY

Some individuals use smartphone features like disappearing messages, hidden apps, and location controls to conceal communications. While these tools are often designed for privacy and security, they can also be misused in personal relationships. Experts note the importance of transparency and consent when monitoring a partner's device.

Published: Analysis:

Daily Mail — Culture - Other

This article 29/100 Daily Mail average 39.1/100 All sources average 47.5/100 Source ranking 21st out of 23

Based on the last 60 days of articles

Article @ Daily Mail
SHARE
RELATED

No related content