i have been stuck in a hack for over 2 years. i kniw who is doing it and they are doing it to steak my business and my calls. my devices are running off linux but i didnt install linux and never had a linux device.
i see swappper and selinux in the revocery logs, i have also seen jenkins slave in another device. regardleas how many phones i buy, new accts i create ir new phone numbers i get, i still have the hack so its ckearly something deeper. i need soneone to remotely see whats goibg on for the first portion, then the second portion woukd be to remove it. my phones tyoically have about 400 apps and most i cant control the permissions on.
My networks, apps, accts, phone calls, phone nunbers, messages, file and accts are all being effected, device after device also my googke accts tekk me a linux devuce is sighed in wheb i sign in so i believe there is a linux partion or sonething connected to me.
DescriptionIn this final assignment, the students will demonstrate their ability to apply two ma
Path finding involves finding a path from A to B. Typically we want the path to have certain properties,such as being the shortest or to avoid going t
Develop a program to emulate a purchase transaction at a retail store. Thisprogram will have two classes, a LineItem class and a Transaction class. Th
1 Project 1 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of
1 Project 2 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of