How to catch a thief
Stealing my identity and getting in my files can I get a api to be pro active and then stand your ground and attack back by putting system altering api's on him before he can even try to get into my things
Terry if you find out I would love to know. I’ve been fighting a complete hostile takeover from smart home apps across Samsung, apple, google, att WiFi google WiFi, apple homekit, browser plugins, internet providers and yubikeys, it’s never ending. I landed here by accident as I was trying to delete one google product at a time. I then discovered all the API’s, reengineered apple apps, and registered my friends and family under mobile device management remotely wiping our phones computers, and installing SDK rebuild on the firmware of everything else. If anyone wants a job.. let me know... FOR REAL!