I’m dealing with a domestic abuse case with a cybersecurity architect and just found out he’s been living a double life with another woman for the last 4 years. He has always threatened he can get into my cameras at home, phones, and monitor me via my Wi-Fi. I’ve also found suspicious apps installed on devices like my fire tv and phone, and was wondering if anyone could help me prove his actions and trace them even if he has access to many cybersecurity resources and IP masking apps.
Best answer by TripleHelix
View original