What Are the Steps to Remove a Root-Access User Who Is Stalking Me on My Devices?

Title: How to Protect Yourself from Digital Stalking: A Personal Experience

In today’s digital age, our devices have become an integral part of our daily lives. However, with increased connectivity comes the risk of invasion-of-privacy threats, including stalking and cyber intrusion. Recently, I found myself in a distressing situation where I suspected that someone had gained unauthorized access to my computer and smartphone, leading to a series of alarming events.

It all began last year when I started noticing peculiar activities on my computer. Browser tabs were moving without my prompt, songs played spontaneously, and my mouse cursor seemed to have a mind of its own. The issues extended to my Android phone, where icons would randomly shift, and my Reddit feed would scroll down on its own as I read.

An unsettling incident occurred one day as I approached my front door. A video of a boxer training unexpectedly started playing on my phone. I hadn’t even touched the device for half an hour; I had only used it earlier to calculate my grocery total. The bizarre nature of these occurrences raised alarm bells in my mind. During a conversation with my cousin, I even overheard strange noises, resembling someone pressing phone numbers and mumbling, which added to my concerns of being monitored.

In a bid to regain control over my digital life, I decided to dispose of my computer. I was deeply troubled after discovering a flash of “4chan” in my Firefox browser and noticed that my hard drive had inexplicably gained 6.3GB of data, despite my not downloading anything. The fear of being falsely implicated in illegal activities due to someone else’s actions loomed heavily over me.

I disconnected myself from the internet entirely and switched to a basic phone—an Alcatel model—with no online capabilities, believing I would be less susceptible to hacking. However, my worries were far from over. I’ve still experienced strange notifications labeled “Unknown Application” and noticed a clicking sound when I lock and unlock the phone, which I couldn’t find a way to disable. Additionally, draft messages were being deleted unexpectedly.

Frequent communications with my cousin have left me feeling anxious, as I feared that my phone could have compromised his device as well. How could a hacker potentially gain access to even a non-smartphone like mine? The idea is perplexing and distressing.

Looking ahead, I’m contemplating reinstating my internet connection and purchasing a laptop. However, I’ve learned that malware can also be installed on a router, which complic

Share this content:

Leave a Reply

Your email address will not be published. Required fields are marked *