What steps can I take to eliminate someone who has obtained root access and is monitoring me on my computer and mobile device?

How to Navigate the Nightmare of Digital Stalking: A Personal Account

In today’s digital age, the increasing interconnectivity of our devices can sometimes lead us down a dark path. I want to share my unsettling experience in hopes that it might help others facing a similar situation. This is not just a technical issue—it’s a personal nightmare of being stalked by someone who gained unauthorized access to my devices.

The Onset of Strange Occurrences

Late last year, I began noticing odd behaviors with my computer and mobile devices. My computer’s screen became a source of confusion as browser tabs opened and closed without any input from me. Music started playing spontaneously on iTunes, and even the mouse cursor seemed to have a mind of its own. It was as if someone was manipulating my devices from a distance.

This unsettling reality was mirrored on my Android phone, where icons rearranged themselves and Reddit pages scrolled down automatically while I was reading. The most bizarre incident occurred when a boxing video began to play on its own just as I unlocked my door at home, despite having put my phone down during my bus ride.

The Awakening

Things escalated further, leading me to wonder if my phone was being monitored. During a conversation with my cousin, I distinctly heard the sounds of phone numbers being dialed and a strange voice mumbling—neither of us made those noises. At that moment, I felt the chilling realization that someone might be listening in.

The tipping point came when I discovered something alarming while using Firefox. For a split second, the word “4chan” flashed on my screen, something I had not searched for or visited. It raised immediate red flags in my mind. Additionally, my hard drive showed a sudden and unexplained increase in data—6.3 GB, to be precise—despite not downloading anything. My mind raced with the possibility of being framed for illicit activity by someone exploiting my devices.

Radical Measures

Fearing for my safety and sanity, I made the drastic decision to dispose of my computer, disconnect from the internet, and switch to a basic phone with no internet access. I hoped this would create a robust barrier against further invasions. However, the unease persisted as I began receiving strange notifications—“Notification: Unknown Application”—despite my lack of connectivity. I also noticed oddities like random deletion of draft messages and unexplained clicking sounds.

Moreover, I became increasingly convinced that my cousin might be inadvertently involved. If

Share this content:

Leave a Reply

Your email address will not be published. Required fields are marked *