Most articles are about hacking and my intent is to setup a full defense to my business that is thoroughly hacked through a pernicious hacking of all texts, phones and pc displays.
There is isatap adapter on pcs, system preferences moved and lost on macs, remote shutdown, extension of battery life and monitoring.
This has to do with a circumstances I won't go into but there is a criminal suspected of jealous stalking and tampering.
There is a ZTE maven phone with clients calling from as long as 7-1/2 years and they expect to text, and call without being surveilled or even the phone just being shut down or even worse a physical stalking as soon as I turn it on or have it around.
What are the options to 1) get rooted startup scripts and packages off my phone and 2) trap data about the individuals suspected please.
My first priority is to get phone function back. I have master reset as much as 10 x a day and even on different sim and phone there is still a changing or spoofing of apps within 10 minutes. One app had a whopping 238 permissions added to it including finding out what car speed you are at and so forth. Please help!
I am technical just not too techie with android yet. I do need my business back there is almost total financial ruin and damages, financial and beyond please.
Thank you.
I too have been hacked all four of my phone's are controlled by remote. Thankfully it's not business oriented o have no financial data on any phone but I do have contacts whose anonymity is most important to me. My phone book and my texts have been transferred several times and I am in contact of sorts with a person or persons either trying to help or hackers posing as good Samaritans. Whatever steps I take towards de hacking my phone's when successful I will get back to you with my solution and hopefully it will help you too.
Related
hi,
as a victim of lost or stolen phone being used to sign up to premium rate text service, which can not be blocked according to phone companies I was wondering two things.
1. the ****tard signed up online using my name and number - that is all, and then confirmed the sign up by just returning a text from my phone. Is there anyway to trace the computer and thus the user who stole my phone and signed up. Any techies here who fancy the challenge - and give hackers a good name for a change? I'm thinking trace to a internet cafe computer and then ask cafe for CCTV...... like that case where the barrister was caught.
2. I think that a sign up to any such services should require security at least at the level that one has to use when speaking to your phone company.... ie providing a password of the account, etc. Returning a text is no confirmation at all - as it can all too easily be in the hands of a crook. It is in fact an open wallet, one that can hold hundreds or thousands to lose over a matter of hours. The regulator, phone companies and police are all, "it's not fair" but apply for a refund........(which is proving hard to even get through to the company of course)
I was relatively lucky, as at £260 at least it's the low end of fraud, but it makes me very angry that genuine innovative technology is poorly implemented and leaves open such obvious flaws for sharks to so easily take advantage.
Any suggestions.
Regards
anyone got a view on this?
so is no one interested in letting me know or suggesting a good protocol / technical mechanism that the industry could use to make it necessary for a handset to start using a texting service it must go through a security check with the phone provider....... such as PIN with phone provider, to prevent thieves from setting up via the web and then getting handset going stealing 1000's out of one's account.
The phone company operators are saying they can't do that?
Anyone give me some ammunition to say 'yes you could'?
Please anyone.
For some time now, many years, I have experienced problems with my cellular telephone that I could not explain or rectify. I know I am being hacked and no matter how many times I factory reset the phone the problems still exist. My phone has been lost and stolen in which insurance has replaced the phone and in no time or immediately I experience the exact same problems. My videos and pictures are altered, deleted or hidden. All the programs or applications seem to be altered or customized with options that are not the genuine owners options. The graphics associated with the applications and web pages are not the genuine images and I am sure that violates trademark, copyright, intellectual property rights and other laws I am not aware of. Web pages information, contact information, address information, and content are altered and changed which can affect all sorts of areas such as personal safety, product safety, access to information is blocked, altered or displayed in ways that make it impossible to get directions, product availability, law enforcement help, legal help and information. When I use Google Maps for directions, it will take me down one way streets, have ludicrous directions, unnecessary turns, wrong speed limits, and out right wrong directions or even switch my end point without my knowledge. I tried to order cleaning gloves and masks today, and no place in my city was in stock, and delivery was not until July the 5th, 2020. I am also experiencing the same things with all my electronics such as my computer, smart televisions, printers and gps units. I did a screen recording of the applications on my phone, and the about phone section. I know from that it is apparent that my phone is hacked and under control of some other party or person. Someone is either maliciously attacking me with the purpose to cause extreme harm for reasons of personal enjoyment, or my name, reputation and activities have been purposely misled and lied about in a gross manner where a cellular telephone developer, or a technology hacker, or information pirate or mercenary developed and/or gave someone or some group a program and knowledge on how to capture my phone and all other electronics and hold it hostage. I have tried to root the phone in order to put a custom rom on it, but my searches and efforts are blocked and never get any traction or success. I am attaching the screen capture video- it is 20+ minutes and will show the extent of the hacking. Someone is perverting and illegally using developers tools, programs, applications and code in ways that were never intended and can only lead to extreme problems of which in all honesty death or terminal scenarios are all real possibilities. I am hoping to identify these people with your help, and bring them to justice and alleviate my life problems that this has caused and stop the illegal and intentional perversion of the original intent for cellular development which is the fruitful search for knowledge and advancement of useful and legal technology. Please help me in this battle to which all operations on my device are unsuccessful, disheartening, and uncontrollable. Thank you in advance and if this should be posted in another area or forum please advise, however I am posting it in a few that I think are relevant. I live in Houston, Texas- so if there is a group of developers, or some people that can help me combat this locally please message me their contact information. Take care. - Dale-
Screenshots attached and a link to the video of my phone and it’s contents.
Here is the link to the screenshots of applications, programs and phone information: wwwdotdrive.google.com/drive/folders/1OImrdp64ndMzJGN74v7K4G6H4zc2DzV9?usp=sharing
Here is the link with the video of the screen shots and a little narration: wwwdotdrive.google.com/file/d/1i7GU9TVUnqfJvgyLq5roaaPR08EkBf0z/view?usp=sharing
0
For some time now, many years, I have experienced problems with my cellular telephone that I could not explain or rectify. I know I am being hacked and no matter how many times I factory reset the phone the problems still exist. My phone has been lost and stolen in which insurance has replaced the phone and in no time or immediately I experience the exact same problems. My videos and pictures are altered, deleted or hidden. All the programs or applications seem to be altered or customized with options that are not the genuine developer or creator options and images. The graphics associated with the applications and web pages are not the genuine images and I am sure that violates trademark, copyright, intellectual property rights and other laws I am not aware of. Web pages information, contact information, address information, and content are altered and changed which can affect all sorts of areas such as personal safety, product safety, access to information is blocked, altered or displayed in ways that make it impossible to get directions, product availability, law enforcement help, legal help and information. When I use Google Maps for directions, it will take me down one way streets the opposite direction toward oncoming traffic,, have ludicrous directions, unnecessary turns, wrong speed limits, and out right wrong directions or even switch my end point without my knowledge. I tried to order cleaning gloves and masks today, and no store in my city was in stock, and delivery was not until July the 5th, 2020. I am also experiencing the same things with all my electronics such as my computer, smart televisions, printers and gps units. I did a screen recording of the applications on my phone, and the about phone section. I know from that it is apparent that my phone is hacked and under control of some other party or person. Someone is either maliciously attacking me with the purpose to cause extreme harm for reasons of personal enjoyment, or my name, reputation and activities have been purposely misled and lied about in a gross manner where a cellular telephone developer, or a technology hacker, or information pirate or mercenary developed and/or gave someone or some group a program and knowledge on how to capture my phone and all other electronics and hold it hostage. I have tried to root the phone in order to put a custom rom on it, but my searches and efforts are blocked and never get any traction or success. I am attaching the screen capture video- it is 20+ minutes and will show the extent of the hacking. Someone is perverting and illegally using developers tools, programs, applications and code in ways that were never intended and can only lead to extreme problems of which in all honesty death or terminal scenarios are all real possibilities. I am hoping to identify these people with your help, and bring them to justice and alleviate my life problems that this has caused and stop the illegal and intentional perversion of the original intent for cellular development which is the fruitful search for knowledge and advancement of useful and legal technology. Please help me in this battle to which all operations on my device are unsuccessful, disheartening, and uncontrollable. Thank you in advance and if this should be posted in another area or forum please advise, however I am posting it in a few that I think are relevant. I live in Houston, Texas- so if there is a group of developers, or some people that can help me combat this locally please message me their contact information. Take care. - Dale-
Screenshots attached and a link to the video of my phone and it’s contents.
Here is the link to the screenshots of applications, programs and phone information: wwwdotdrive.google.com/drive/folders/1OImrdp64ndMzJGN74v7K4G6H4zc2DzV9?usp=sharing
Here is the link with the video of the screen shots and a little narration: wwwdotdrive.google.com/file/d/1i7GU9TVUnqfJvgyLq5roaaPR08EkBf0z/view?usp=sharing
Hi shooterd,
Everything is fine with your phone. I've seen both your screenshots and screen recording. What you're seeing under settings/apps list are all the system apps as well as the user apps. Most phones have at least 300+ system apps to keep it running. Granted most of them are bloatware and crap which is why there are threads with "how to debloat your phone." I'm going to go over some of system apps that you've scrolled through and tried to disabled.
Adapt Sound is found under settings/sounds, it's sort of an equalizer for all the audio on your phone.
Android Easter Egg is a built in mini-game that Google included with every system. You can do a quick search to figure out how to activate it. Most times, you go to Settings/About Phone and tap the "Android Version" block rapidly until the game loads.
ANT Radio Services are bloatware/crap.
Application Installer installs apk that you want to sideload or apps from Play Store.
CaptivePortalLogin handles the "Sign in as a guest" when you join open wifi networks such as those in cafes or hospitals.
ChocoEUKor (along with a few others, they share the same icon) is part of the stupid font bundle from Samsung.
Again a lot of these are necessary for your phone to run and is completely normal. The other 100 are removable bloatware which you can find a list of by doing a web search. It would be easier if you root your phone and then use Titanium Backup to debloat.
"My videos and pictures are altered, deleted or hidden."
You haven't shown any proof of this but if you keep reseting your phone, you'll lose internal storage data which might be what happened.
"All the programs or applications seem to be altered or customized with options that are not the genuine developer or creator options and images."
They all look fine to me, if the icons are weird, it could be your Android version or home launcher theme. I use Nova Launcher so if I go to Settings/Look & Feel, it gives you options for the icon theme including round, squircle (which is what yours currently is), rounded square, flower, adapative, legacy, etc...
"When I use Google Maps for directions, it will take me down one way streets the opposite direction toward oncoming traffic, have ludicrous directions, unnecessary turns, wrong speed limits, and out right wrong directions or even switch my end point without my knowledge. "
This is either bad GPS or bad Google Maps data. Try Waze. Although it's own by Google, it has better routes in my experience. It also sounds like you're dealing with some cognitive impairment*
"I tried to order cleaning gloves and masks today, and no store in my city was in stock, and delivery was not until July the 5th, 2020."
Short supplies, I remember it being the case everywhere. I couldn't order hand soap for two months.
"I am also experiencing the same things with all my electronics such as my computer, smart televisions, printers and gps units."
Where? How? You haven't shown any proof.
"I have tried to root the phone in order to put a custom rom on it, but my searches and efforts are blocked and never get any traction or success."
It's hard in general. And if you've updated your phone pass whatever ****ty unprotected bootloader version is necessary to root your phone, it will be impossible to root your phone. This may be the case based on your Software Information section. Check the thread requirements and make sure your phone meets those.
*I've mentioned cognitive impairment early because you sound paranoid. Are you experiencing a lot of stress, trouble sleeping, etc? And this may be odd but do you have a lot of bug bites? Bed bags are known to cause paranoia. Sorry if this isn't what you want to hear but your phone is perfectly fine.
To protect your privacy, you should probably take down your screen recording. And if you need to talk, I'll check here more frequently for the next couple days. Good luck.
For some time now, many years, I have experienced problems with my cellular telephone that I could not explain or rectify. I know I am being hacked and no matter how many times I factory reset the phone the problems still exist. My phone has been lost and stolen in which insurance has replaced the phone and in no time or immediately I experience the exact same problems. My videos and pictures are altered, deleted or hidden. All the programs or applications seem to be altered or customized with options that are not the genuine developer or creator options and images. The graphics associated with the applications and web pages are not the genuine images and I am sure that violates trademark, copyright, intellectual property rights and other laws I am not aware of. Web pages information, contact information, address information, and content are altered and changed which can affect all sorts of areas such as personal safety, product safety, access to information is blocked, altered or displayed in ways that make it impossible to get directions, product availability, law enforcement help, legal help and information. When I use Google Maps for directions, it will take me down one way streets the opposite direction toward oncoming traffic,, have ludicrous directions, unnecessary turns, wrong speed limits, and out right wrong directions or even switch my end point without my knowledge. I tried to order cleaning gloves and masks today, and no store in my city was in stock, and delivery was not until July the 5th, 2020. I am also experiencing the same things with all my electronics such as my computer, smart televisions, printers and gps units. I did a screen recording of the applications on my phone, and the about phone section. I know from that it is apparent that my phone is hacked and under control of some other party or person. Someone is either maliciously attacking me with the purpose to cause extreme harm for reasons of personal enjoyment, or my name, reputation and activities have been purposely misled and lied about in a gross manner where a cellular telephone developer, or a technology hacker, or information pirate or mercenary developed and/or gave someone or some group a program and knowledge on how to capture my phone and all other electronics and hold it hostage. I have tried to root the phone in order to put a custom rom on it, but my searches and efforts are blocked and never get any traction or success. I am attaching the screen capture video- it is 20+ minutes and will show the extent of the hacking. Someone is perverting and illegally using developers tools, programs, applications and code in ways that were never intended and can only lead to extreme problems of which in all honesty death or terminal scenarios are all real possibilities. I am hoping to identify these people with your help, and bring them to justice and alleviate my life problems that this has caused and stop the illegal and intentional perversion of the original intent for cellular development which is the fruitful search for knowledge and advancement of useful and legal technology. Please help me in this battle to which all operations on my device are unsuccessful, disheartening, and uncontrollable. Thank you in advance and if this should be posted in another area or forum please advise, however I am posting it in a few that I think are relevant. I live in Houston, Texas- so if there is a group of developers, or some people that can help me combat this locally please message me their contact information. Take care. - Dale-
Screenshots attached and a link to the video of my phone and it’s contents.
Here is the link to the screenshots of applications, programs and phone information: wwwdotdrive.google.com/drive/folders/1OImrdp64ndMzJGN74v7K4G6H4zc2DzV9?usp=sharing
Here is the link with the video of the screen shots and a little narration: wwwdotdrive.google.com/file/d/1i7GU9TVUnqfJvgyLq5roaaPR08EkBf0z/view?usp=sharing
Scrolling through the apps installed on my phone, and it is hit or miss on which of the Android and/or Google apps have \u0026 in the middle of their names. Not all, but it seems the important ones do, that downloaded and installed in the middle of the night hours or days after the initial purchase and set up of the phone. Isn't Gmail, Chrome, Android Web View, Device Unlock, Calculator, Device Health Services, and most Google services already installed in Android phones? It's even in some of the apps I installed later on, but not all. I have looked it up, both here and using different search engines. Not too excited with the results, nor do I have the IT brains to understand all the jargon. Would someone here please explain it in layman's terms? BTW, I know I have been hacked/tracked by my ex for a while now. Would \u0026 happen to be a way to remote access and monitor my phone usage?
EDIT: Nothing was synced to old phones, devices, or accounts. This isn't the first new device he has gained access to. There have been several brands and models, phones and laptops. Your guess is as good as mine, and the police, as to how it is being done. Sometimes he leaves "<rooted>" on the screen or turns on 911 only it locks up the phone a few hours after bringing it into the house. He works in the tech industry. No, this isn't my device I've asked this on. This really hasn't been as fun as it sounds.
Thank you all in advance!
I will put my tin foil hat on while anxiously waiting your replies.
(I know, funny not funny. Either has been having to live with his BS.)
Checking back and bumping. There was just one reply on another thread. Please, someone has to know of this Google and Android system hacking apps combo floating around in Google Developer and Firebase. It's a real thing, and my nightmare now. I will not censure if you developed it or are using it on someone other than me. However, I beg you to reconsider if you are. There are days that I feel that worrying about the safety of my kids and if he does show up somewhere I'm at with a grudge to settle is too much to handle. Not everyone has the ability to get through that. I did not deserve his controlling abuse when we were together and there seems to be no way to get out from under his thumb currently. The local cyber cops have been of no help. They either do not believe this happening, these types of apps exist and what they do are possible (One said, "Those kind of things are just in James Bond movies"), or they think there is no imminent threat because there aren't bruises and the little I do have in the bank has not been touched after closing and opening numerous accounts to keep him out. I make just enough to support my kids and myself. Banking, online shopping, and social media are impossible, and the time is now spent trying to end this on my own. Please, help is needed. One of the members on here has to know what the hell this is.
Thank you again.
ripppani said:
\u0026 seems to be the escape sequence of the Unicode character &. \u0026 cannot do any damage by itself, but it can be and probably is a result of incorrect encoding or decoding of text strings, which in turn could be caused by hacking. If you don't know what Unicode is, here is the Wikipedia article.
I am not sure whether the "<rooted>" really represents that the device is rooted, but you generally don't want someone untrusted to root your device, as rooting it allows the one who rooted it to have unrestricted access to the device.
Click to expand...
Click to collapse
He has had remote unrestricted access to my devices. The <rooted> is one of his reminders he is there, as well as <bootloadermode>, or the locking up or turning on 911 calls only. This hasn't been fun, either having it happen en use or waking up to it. I do not allow this. New devices, new Google accounts, never syncing, and never logging into old accounts. However, no one seems to be able to figure out how he gets into new devices once they enter the house. New routers, modems, entire internet accounts, he still weasels his way in. The hacking apps are Google Developer based, this I know. Try getting info on that out of Google without a warrant. Cyber cops have brushed this under the rug since there has been no physical or financial harm, as of yet.
He lived with me when we were dating. Is there a device that may be in my home that could hi-jack my wifi, allow him to sign into my device, and show it as my device while VPN-ing an address even after all the changes? (I seems to travel all over the place on occasion according to my IP addresses that show up) The location tracking and call/text monitoring is real, as he has shown up or had let things said in my private (ha!) conversations with others slip. Of course he has nothing to do with this. (ha! again)
Any help or input on this would be greatly appreciated. I have looked things up at the library until my eyes bled. I can only comprehend so much without an IT background. I do not have the money for a cyber forensic investigator, and I know the local police probably have me on the Crazy Crying Wolf list. Which is just as embarrassing as knowing that having a complete lack of privacy in my life is a total nightmare.
Thank you again.