How Can I Remove Someone Who Has Root Access and Is Stalking Me on My Devices?

How to Safeguard Yourself Against Intrusive Cyber Stalking

In today’s digital age, the threats posed by hackers and stalkers have escalated to alarming levels. Recently, I found myself in a disturbing situation that made me realize just how vulnerable our devices and personal lives can be. I was experiencing unexplainable activities on my computer and smartphone, leading me into a distressing ordeal that I never thought I would face.

Curious Anomalies

Late last year, I began to notice unusual behaviors on my devices. My computer would randomly move browser tabs, and music would start playing on its own without any command from me. It felt like someone else was in control, as the mouse cursor seemed to drift independently across the screen. My Android phone exhibited similar eerie behaviors; icons moved on their own, and web pages scrolled while I was trying to read.

One particularly alarming incident occurred when I returned home and a video unexpectedly began playing on my phone, even though I had done nothing to prompt it. There were multiple layers of folders I had to navigate through to access this video myself, so how could it initiate playback without my involvement? The constant sense of intrusion became almost unbearable. Moreover, on one occasion, I exchanged messages with a family member only to hear the sound of phone buttons being pressed in the background—definitely a chilling confirmation that I may have been listened to.

Taking Action

Feeling increasingly threatened, I decided to eliminate the risk by disposing of my computer and reverting to a basic phone with no internet connectivity. However, my sense of security was short-lived. Even with my Alcatel model, which lacks access to apps or the web, I began receiving strange notifications of “Unknown Applications” and hearing unusual sounds when locking or unlocking the device. Draft messages would also disappear without explanation.

Despite not having internet access, I began to harbor concerns that this hacker could somehow reach my cousin’s phone through our conversations. The thought that this threat could extend to others around me was deeply unsettling.

Contemplating Next Steps

Given these ongoing issues, I considered reconnecting my home internet and acquiring a laptop, intending to regularly format the hard drive to remove any embedded malware. However, I quickly learned that malware can reside on routers, posing an even more complex threat. What if visiting guests connected their devices to my Wi-Fi, thereby introducing potential vulnerabilities?

The grim reality began to sink in: addressing this issue might necessitate involving law enforcement

Share this content:

Leave a Reply

Your email address will not be published. Required fields are marked *