How can I eliminate someone who has obtained root access and is stalking me on my computer and phone?

A Disturbing Encounter: Dealing with Computer Stalking and Cyber Intrusion

In today’s digital age, the fear of cyberstalking and unauthorized access to personal devices is increasingly unsettling. Imagine the sinking sensation of realizing that someone has gained root access to your computer and smartphone, intruding on your privacy and peace of mind. This post delves into the harrowing experience of one individual facing such a violation, highlighting the alarming signs, the actions taken, and the ongoing struggle to regain control over their life.

The Beginning of Disturbance

Last year marked the onset of an unsettling series of events for a user who began noticing peculiar activities on their computer. From browser tabs seemingly moving of their own accord to songs blasting from iTunes without any interaction, it became painfully clear that something was amiss. The eerie phenomenon continued on their Android device—icons mysteriously shifting positions and even automatic scrolling during casual browsing sessions.

One particularly chilling incident occurred when the user approached home, only to be greeted by a video of a boxer training that began playing on their phone as they reached the front door—better known as the “point of connection” to their Wi-Fi. This was unsettling, considering how the user had previously accessed the phone solely for basic tasks like calculating a grocery bill.

Heightened Anxiety

In conversation with a family member, the situation escalated when unexpected sounds resembling someone pressing phone numbers pierced through their discussion. Both individuals were perplexed, left with an unsettling feeling that they were being eavesdropped on.

The culmination of the distressing experience came when a brief glimpse of “4chan” appeared in the corner of the Firefox browser, along with the alarming discovery that an unused hard drive suddenly populated with 6.3GB of unexplained data. With concerns mounting about potential illegal content being attributed to them due to a third party’s actions, escalating fears of wrongful legal repercussions became a significant source of anxiety.

Taking Drastic Measures

To safeguard their privacy, the user made the tough decision to dispose of their computer, terminate internet access, and replace their Android smartphone with a basic, internet-less Alcatel phone. However, even with these precautions, unsettling notifications like “Unknown Application” began to surface on this simpler device, along with bizarre clicking sounds that appeared inexplicably. The situation only worsened with random deletions of drafted messages, underscoring the feeling of being watched or controlled.

The possibility that malware could have transferred to

Share this content:

Leave a Reply

Your email address will not be published. Required fields are marked *