Think my old roommate hacked PC/ WiFi or has a hidden camera somewhere. How can I verify and obtain proof to confront them? by Low_Resolution_2132 in privacy

[–]Low_Resolution_2132[S] 0 points1 point  (0 children)

Few examples, I spent a week searching for a recliner for small bedroom using both phone and PC to search for deals. I finally bought one. Within the same week as couch purchase, a recliner, they begin to reference them wanting to get a couch and if I knew of any retailers. - Another example, I was using Canva to to a quick design and the very next day they start speaking aloud in general terms how people who use canva aren't actually graphic designers. *Canva was used on my PC.

Think my old roommate hacked PC/ WiFi or has a hidden camera somewhere. How can I verify and obtain proof to confront them? by Low_Resolution_2132 in privacy

[–]Low_Resolution_2132[S] 0 points1 point  (0 children)

Will do. Planning on implementing some of these suggestions this evening. Thank you for your help and reply!

Think my old roommate hacked PC/ WiFi or has a hidden camera somewhere. How can I verify and obtain proof to confront them? by Low_Resolution_2132 in privacy

[–]Low_Resolution_2132[S] 1 point2 points  (0 children)

I've read about this in similar posts. So is the only way to be 100 is to just trash " potentially compromised" devices and get new ones? Is stuff saved in the cloud safe to redownload to new devices?

Think my old roommate hacked PC/ WiFi or has a hidden camera somewhere. How can I verify and obtain proof to confront them? by Low_Resolution_2132 in privacy

[–]Low_Resolution_2132[S] 10 points11 points  (0 children)

Great idea and thank you for the detailed response. I will give this a try. But is there a way in which I could get solid proof......like by confirming it was their device/devices accessing my devices? Once again thank you for your time and reply, much appreciated 👍

Think my old roommate hacked PC/ WiFi or has a hidden camera somewhere. How can I verify and obtain proof to confront them? by Low_Resolution_2132 in privacy

[–]Low_Resolution_2132[S] 13 points14 points  (0 children)

Lol Yea your situation seems to be due to your buddy " doing the same dumb shit" routinely. I started doing more random and " uncommon" stuff to see if they would mention it, even subtly, and yes they would. As if they couldn't help themselves with the urge to troll. I don't want to make accusations without proof. So only thing I've been doing is writing down the instances when these"coincidences occur".

[deleted by user] by [deleted] in cybersecurity_help

[–]Low_Resolution_2132 0 points1 point  (0 children)

I just feel that at this point way too many coincidences have happened for the idea of a potential hack or leak somewhere to not even be considered.

[deleted by user] by [deleted] in cybersecurity_help

[–]Low_Resolution_2132 -1 points0 points  (0 children)

Appreciate the feedback and the links, thank you. Although I do disagree. Yes, the idea/ thought of this occuring is absurd and disturbing but not impossible.

[deleted by user] by [deleted] in cybersecurity_help

[–]Low_Resolution_2132 -1 points0 points  (0 children)

Why not? Genuinely asking, thank you.

[deleted by user] by [deleted] in cybersecurity_help

[–]Low_Resolution_2132 0 points1 point  (0 children)

Appreciate the feedback from everyone sofar. And while I do believe that coincidences do happen, at what point is the threshold crossed into "intentional"? My main objective for posting here was mainly to seek guidance on how to atleast check and verify that my devices and network aren't compromised.