How Can I Remove Someone Who Has Gained Root Access and Is Stalking Me on My Devices?

Title: Navigating the Challenges of Cyber Stalking: A Personal Encounter with Root Access Intrusions

In an unsettling turn of events, I found myself grappling with a serious and disturbing situation: I suspect I am being stalked by an individual who has gained root access to both my computer and phone. The experience has been not only confusing but also deeply alarming. Here’s a recount of my journey and the steps I’m considering to regain control.

Unraveling the Suspicion

It all began late last year when I noticed odd occurrences with my computer. My browser tabs appeared to move on their own, music played spontaneously on iTunes, and I watched in disbelief as my mouse cursor drifted without any input from me. To make matters worse, my Android phone soon joined the fray. Icons would shift on their own, and while I was trying to enjoy a Reddit post, the screen would scroll downward as if someone was controlling it from afar.

One particularly alarming incident occurred when I arrived home. As I approached my front door, a video of a boxer training began to play on my Android device—without any prompting from me. Earlier that day, I had used the smartphone simply for basic calculations while grocery shopping. Upon returning, I discovered multiple folders opened on the device, including a video that I had not actively sought out. Conversations with friends became chilling as I heard unexplained noises—like phone key presses and muffled voices—during our chats, suggesting someone else might be listening in on our exchanges.

Taking Drastic Measures

Faced with these unsettling invasions, I opted for a fresh start by disposing of my computer and cutting the internet. I chose to downsize to a basic Alcatel phone that lacks internet access, believing it would lower the risk of further hacking. Strangely, however, I have still encountered notifications reading “Unknown Application,” and I’ve heard random clicking sounds when locking and unlocking the device. Alarmingly, drafts can disappear without reason, leaving me feeling increasingly powerless.

Maintaining communication with my cousin has become worrisome; I fear this hacker could have infiltrated my cousin’s smartphone through our messaging. The idea that this person could remotely access my current phone—despite its limited capabilities—fills me with dread.

Seeking Solutions and Support

The thought of reinstating internet access at home is enough to make anyone anxious. While I considered acquiring a laptop and routinely formatting the hard drive in response to suspicious activities

Share this content:

Leave a Reply

Your email address will not be published. Required fields are marked *