• After 15+ years, we've made a big change: Android Forums is now Early Bird Club. Learn more here.

Can someone hack my stylo 3 through an sms picture?

What makes you think that you are stalked?

They have bragged about hacking me.

Followed me around. Places I frequent. Google "gang stalking" and that's what they do. They leave bullet casings in my driveway. They've flattened my tires. Going on 16 years of this.

They spread rumors about me that I'm a terrorist, mass shooter, pedophile, a stalker, a hermit that never leaves his house....you name it.

Sad thing is I'm actually a good guy. I help my mother work with the homeless. I do animal rescue. I work with mentally disabled people.

My mother has chanhed her number 4 times because of these jerks. I've chamged my number at least 5 times...I think 6 actually....

They're evil. And a pack of bullies.
 
Upvote 0
Only help with the home issues is to Mount cameras around the perimeter of your house other than suggesting you move to a different location. As for the cyber world I suggest creating another account and password for everything and not using your real name by creating an alias name. 90% of cyber bullying is done by somebody we know that's using an alias name to conduct their dirty work under, So you have to out think them and stay one step ahead in conducting your business online.
 
  • Like
Reactions: lvt
Upvote 0
As @KBU2 says, create one or more online identities, they need to be self consistent with whatever backstories you choose. and use a VPN so they don't appear to come from your area. Use an encrypted email like https://protonmail.com, https://www.hushmail.com/ or https://tutanota.com/. It's also a good idea to have some disposable email addresses, use 'em and lose 'em as/when they are compromised.

Use an unlocked dual sim phone with 2 PAYG simcards from different operators. do not register the SIMs and buy credit from local stores for cash. Only give the numbers to people you trust.
Oh, and have another burner phone (cheapest handset you can find) & Sim that you're happy to lose/trash for those you don't know/fully trust.

And use offline communications (physical mail) where that's feasible.
 
Upvote 0
As @KBU2 says, create one or more online identities, they need to be self consistent with whatever backstories you choose. and use a VPN so they don't appear to come from your area. Use an encrypted email like https://protonmail.com, https://www.hushmail.com/ or https://tutanota.com/. It's also a good idea to have some disposable email addresses, use 'em and lose 'em as/when they are compromised.

Use an unlocked dual sim phone with 2 PAYG simcards from different operators. do not register the SIMs and buy credit from local stores for cash. Only give the numbers to people you trust.
Oh, and have another burner phone (cheapest handset you can find) & Sim that you're happy to lose/trash for those you don't know/fully trust.

And use offline communications (physical mail) where that's feasible.

I have 2 factor authentication on my gmail accounts. Is that enough?

Or is it possible they are in those as well? Wouldn't they need physical access to my phone?

Can I use a VPN on my phone? Google play store app I'm guessing..

Thanks.
 
Upvote 0

BEST TECH IN 2023

We've been tracking upcoming products and ranking the best tech since 2007. Thanks for trusting our opinion: we get rewarded through affiliate links that earn us a commission and we invite you to learn more about us.

Smartphones