Take some of these prescribed steps to lock down your devices and eliminate stalkerware Via consumer reports
Start out with the basics, like changing passwords and reviewing privacy settings on your accounts, Galperin says. An abuser may be getting information through shared calendar apps, social media check-ins, email being forwarded to another account, location sharing on navigation tools or other apps, or well-meaning friends who don’t know about the abuse.
Or the perpetrator could have physical access to your phone or be able to log in to your cellular account to look through call logs, text messages, and billing records.
Once you’ve looked into these access points, see if the situation persists. If it does, your problem could be stalkerware—software that’s covertly placed on computers or mobile devices that can intercept phone calls and text messages, and secretly record other information.
Have an amazing project to share? The Electronics Show and Tell is every Wednesday at 7:30pm ET! To join, head over to YouTube and check out the show’s live chat and our Discord!
Python for Microcontrollers – Adafruit Daily — Python on Microcontrollers Newsletter: A New Arduino MicroPython Package Manager, How-Tos and Much More! #CircuitPython #Python #micropython @ThePSF @Raspberry_Pi
EYE on NPI – Adafruit Daily — EYE on NPI Maxim’s Himalaya uSLIC Step-Down Power Module #EyeOnNPI @maximintegrated @digikey