How can I eliminate someone who has compromised my computer and phone by gaining root access and is now constantly stalking me?

Escaping an Online Nightmare: My Experience with Stalking and Hacking

In today’s digital age, technology can be a double-edged sword. While it enhances our lives by providing connectivity and convenience, it can also expose us to grave threats. I find myself sharing a cautionary tale of paranoia and fear that stemmed from being targeted by an individual who gained root access to my devices.

An Unwelcome Intrusion

Late last year, I began noticing odd occurrences on my computer. Cursor movements appeared erratic; browser tabs opened and closed seemingly on their own, while music played without any input from me. It was as if an invisible hand was controlling my device. The unsettling behavior didn’t stop there. My Android phone also exhibited strange symptoms—icons rearranging themselves and web pages scrolling unexpectedly while I was engrossed in reading.

The tipping point occurred when, upon returning home, a video started playing on my phone just as I reached my front door. I had to navigate through multiple folders to access it, yet there it was, inexplicably playing without my direction. Previously, I had utilized my phone just half an hour prior while I was out, and I hadn’t accessed any of the folders leading to the video. The unease deepened when I overheard bizarre sounds during a conversation with my cousin, leading me to suspect that our discussion might have been monitored.

Desperate Measures

In a state of panic, I decided to dispose of my computer altogether. During my last use of Firefox, I caught a fleeting glimpse of “4chan” appearing at the bottom of the screen, as though someone had accessed it without my knowledge. Disturbingly, I discovered unexpected data on one of my hard drives—6.3GB of mysterious files appeared overnight. I feared that any illicit content found on my system could be wrongly attributed to me, leaving me vulnerable to legal repercussions I could not defend against.

After discarding not only my computer but also my home internet and smartphone for a basic, internet-free Alcatel phone, I thought I would regain some control. However, even this straightforward device presented challenges. Notifications for “Unknown Applications” began appearing on the screen, and I heard strange clicking noises when locking and unlocking—no features of which I could trace in the settings. Messages would also vanish from the drafts unexpectedly.

The Possibility of Cross-Contamination

My concerns didn’t subside with the new phone. I became increasingly apprehensive

Share this content:

Leave a Reply

Your email address will not be published. Required fields are marked *