Pitfall of Social Media: The Hacking of Personal Devices of Users

Share with your friends

Last December, I posted on Twitter 2 photos which represented 2 memes I found on the Internet. The first photo was a picture of one of Egypt’s past presidents with the words “Israelites left Palestine Black and came back White,” and the other meme showed the Vatican with the symbol of the Sun which alluded that Catholics were Sun worshippers. I am not sure which of these 2 memes angered a hacker. A few minutes later, my brand-new iPhone 11 sent me an error message stating that my phone had no SIM card. My cell phone had a physical SIM card, but for some reason, my iPhone did not recognize it anymore. If anyone called and texted my phone, the call and text would have gone through except it would no longer come to my phone. It would have gone to whoever just cloned my SIM card. AT&T was my service provider. I immediately went to the AT&T store, and they refused to cancel the account. I called AT&T, they cancelled the account, and sent me my final bill. I was so scared; I did not dare open a new cell phone account. I used a prepaid phone for about 2 weeks until I got tired of it. A couple weeks later, I joined T-Mobile. I do not trust AT&T since. This was not the end of the ordeal though. When I tried to log in my AT&T account to pay my final bill, I couldn’t. Whoever stole my number changed my password. How? Any two-step verification process would send the code to my phone number, and the hackers would receive the code, and thus, they could change the password on my account.

Since the September 14th arrival of nearly 14,000 Haitian migrants in Del Rio, Texas, many Haitians and I have used social media to tag U.S. officials who have power to deport or give asylum to these Haitians. These U.S. officials include Sec. Alejandro Mayorkas of Dept. of Homeland Security, and Sec. Antony Blinken of the State Dept. Shortly after Sec. Mayorkas announced $5 million “aid” to Haiti for the 4,000 deported Haitians, I made a 10-minute video and posted it on my Facebook page to explain to Americans that the $5 million will most likely go to gangs and a corrupt government rather than to actual deportees. I also mentioned in the video that a small number of Arabs and Jews control Haiti’s vast wealth. I tried to put the video in a Facebook ad, and Facebook rejected my ad. This is how Facebook silences the truth. Americans don’t get to hear how they their tax dollars masquerading as “foreign aid” are used in countries like Haiti to finance corruption, international businesses of a few billionaires, and even, terrorism. I deactivated my Facebook account in protest; I did so on September 30th. I then took to Twitter in the next several days to share the truth of what has really been going in Haiti for the past 100 years that have forced Haitians to leave their home.

Sure enough, after some controversial tweets in which I tagged Sec. Blinken, Sec. Mayorkas, Gov. Abbott of Texas, and Gov. DeSantis of Florida, my personal devices (i.e., personal computer and cell phone) have been acted weird. I have been hacked.

Let’s start with my personal laptop. Two days ago, I noticed the icons of applications on my laptop are moving as if someone has remotely accessed my laptop. I quickly turned off my Internet connection. A few hours later, I ran a program on my laptop to run a diagnostic of my laptop and fix any security issues. The program found issues but asked me to close “Microsoft Edge” before it can start fixing the security issues. Only one problem: I don’t have Microsoft Edge open. I closed all programs before I ran the diagnostic test. The program insists that Microsoft Edge is open, and I needed to close it. I did a little IT troubleshooting to see what programs were running on my computer. Sure enough, Microsoft Edge was opened (2 instances of the program) except it was not opened on my end. Anyway, I closed these 2 ghost instances of Microsoft Edge for the program to get rid of my security issues. I use a VPN (virtual private network); and I encourage all of you to use VPN on your personal devices. Do NOT use McAfee! Some companies (McAfee, Verizon, etc.) must be avoided!

Now let’s talk about the hacking of my iPhone 12. About three days ago, apps on my cell phone started closing on their own, each time I open them. Very rude, of course, but also signs of remote access to my iCloud/iPhone. Apple iPhones are ones of the most secure personal devices. Whoever has managed to hack my iPhone is not an average person. Two nights ago, I restarted my iPhone after I turned it off, and I found Facebook app is downloaded on my phone. I deactivated my Facebook since September 30th. Someone else has managed to download the app on my phone even though my phone was off. I reported the incident to Apple. Whoever is working at Facebook who desperately wants me to use their platform needs to approve my ads; all of them, regardless of their content. Big Tech censorship needs to end.

Be safe out there, folks. Do not let hackers, Big Tech, and Big Govt silence you.

Share with your friends

Leave a Comment

Your email address will not be published. Required fields are marked *