Skip to playerSkip to main content
  • 2 days ago
A woman's phone falls into a dangerous man's hands and uses it to stalk her relentlessly, turning her life into a nightmare of constant fear.
Transcript
00:00This killer has been boiling a bowl of instant noodles every day for eight years, but strangely,
00:04he never eats it. Instead, he wipes off the grease with a towel, then takes a photo and
00:08posts it on his social media, setting it so only family and close friends can see.
00:11His purpose for doing this is to create the illusion that the phone's owner is still alive.
00:16Over the past eight years, he has used this method to murder eight young, beautiful girls,
00:20and his counter-surveillance skills are extraordinary. He's been able to evade
00:23police searches every time. One evening, a girl, exhausted from work, fell asleep on the bus.
00:28When she woke up at her stop, her phone accidentally dropped to the ground, and it was picked up by a
00:32man. Seeing the sweet image of the girl on the screen, the man's interest was piqued. He wanted
00:37to open the phone and snoop through the girl's private information, but he failed multiple times
00:41to crack the password. Then, an idea came to him. He smashed the phone's screen, then took apart the
00:46phone's main board and installed a listening device. He then used a voice changer to disguise himself as
00:51a cute girl and called the girl. He told her he had found her phone, but the screen was broken,
00:55and he had already sent it to a repair shop. The girl, following the address he gave her,
00:58arrived at an old, run-down apartment building. The hallway was dimly lit, and there were barely
01:02any residents. She pushed open the door and saw her phone on the table. When she picked it up,
01:07the screen was indeed cracked. The man, pretending to be the repair technician, asked the girl to fill
01:12out a form. Without suspicion, she provided her personal information. Afterward, the man replaced the
01:17screen and successfully unlocked the phone using the password she had given him. Then, he secretly
01:22installed a Trojan program into her phone. This way, all of her phone's data, including contacts,
01:27messages, and locations, were synced to his phone.
Be the first to comment
Add your comment

Recommended