"Did Mommy already go to bed, hey? Poor little Klausi. Thinks he can just go on like he always does. But unfortunately, I gotta tell you that he can't. This was the very last time I let you insult me. Did Mommy not show you enough tits? Your disrespectful and vulgar way of talking is repelling and disgusting. " L.O. (The terrified 'Victim')
A Lust for Revenge
The discard wasn’t the end. It was only the ignition point.
In the weeks that followed L.O.'s ghosting of me, I found myself spiraling into a state of confusion and desperation. I sent a series of increasingly emotional emails trying to understand what I had done, clinging to some hope of her return. Trying to get some form of reaction, I descended into threats and verbal abuse, alternating between insulting her and pleading with her. But none were answered. They never would be. She decided to keep these reactive emails for later use to make it look like I was the abuser and to further her narrative of being the terrified victim. Psychologists call this "reactive abuse". Narcissists are well known for causing their victims to react emotionally and then weaponize the result. For the next three months I wondered how who professed to care about you could just switch off their feelings from one moment to the next. I had a very good idea of what she was but I still did not know just how twisted and psychopathic she would present.
Ghosting me wasn't her final act. Next came the digital attacks. Between November 16th and 29th, more than 20 of my personal accounts were systematically hacked: Amazon, Pay Pal, Google, Microsoft, Gmail Accounts, ProtonMail, LinkedIn, ElevenLabs, Facebook, Crypto Exchange accounts, all hacked in a way that only someone with complete access to all my passwords would be able to do. Recovery emails were changed, passwords reset, accounts were deleted, and fake ones were created using my hijacked email addresses.
It soon became obvious to me that L.O. was behind the hacking. A taunting message sent to me during the ten day hacking marathon, from a hijacked LinkedIn account only she knew was connected to me. It read:
"i hope u'r well, for now... have a nice time!"
This was personal. She wanted me to know that it was her. She wanted me to know exactly who was doing this to me. Accounts were deliberately closed and work libraries were deleted, not for any monetary gain, but to make it impossible for me to earn a living. But they left traces. There were the google activity records from the hacked Gmail accounts, and an inadvertent IP trace on the one day they neglected to turn on their VPN. We traced the IP address as well as several other identifying data. It was Hemmoor, Northern Germany. I later discovered this was near the home of her hacker boyfriend Dom.
As she had just started her new job at a publishing company in Rastatt there was no way she could travel that far north. It is my belief that she coordinated the attack with Dom, communicating over Telegram and that she perhaps travelled to Hemmoor for some of the ten days during which I was attacked. We know for certain she met Dom at Rastatt Station around the 15th September which was when she took the photo she would later have Dom post on his Telegram profile. The only photo I have ever seen where she is with a man.

Above is an altered illustration of the photograph taken by L.O. of herself and Dom posing together only days after she had ghosted me on August 26th. The image is AI generated and does not depict any actual persons, living or dead. She sent me this photo during the attack by getting Dom to upload it on his profile for a few minutes, during which time I took a screenshot. It is now in the evidence vault.
Below is a email she had sent me showing her signature style sign off. It is remarkably similar to the way the message was written. Besides, why would any random hacker write such a message? And the fact that the message(right) was sent from an account not in my name, that only she had known about, makes it certain the message came from her. Narcissists are famous for triangulating different partners in order to manipulate them. This image was meant to destabilise me during the cyber attack. They attempted to steal funds from more than eight separate crypto exchanges, but as usual she failed. The F2A that I had put in place stopped the transfer of funds.
Then, on December 18th, 2024, L.O. filed formal but false cybercrime charges against me in Germany. She had managed to make Interpol believe I was an international cyber terrorist and a psychopathic stalker. She really is that good at playing the victim. It was a textbook reversal, the abuser now playing the victim. She falsely accused me of fraud, stalking, hacking, sexual assault, intimidation, forgery, harassment and cybercrime, the exact things she had been doing to me! She was laying the groundwork for a legal trap I had never seen coming. Of course the fact that she was a woman 30 years my junior made her fake victimhood all the more believable. It was one of the reasons why she had chosen me.
Two months later, on February 14th, 2025, the South African police's Cybercrime unit arrived at my home at 04:00 am and confiscated my PC and all of my hard drives as well as my cell phone and the passport that I had gotten just a few months earlier to go to visit her. They informed me that she had laid charges and said they were acting on a request from German authorities. With my custom built rig now gone and all of my work libraries confiscated she had finally managed to make sure I could no longer make a living. Soon afterwards I had to resign from work. Despite her loud claims that I had destroyed her job and her and her families' life, she was free to continue on to her new job and to go after her next victim, secure in the knowledge that I would soon disappear into the African sunset.
Below: The first blackmail attempt by the narcissist L.O. She always resorted to this type of tactic when she wanted something.
By this time I had started to realize that the whole thing had been nothing but a long distance romance scam. Everything she had ever said and done had been faked. The fact that she had told me her surgery would cost 20 000 euros proved that. How? Because I found out the procedure costs at most 3000 to 5000 euros. The only way to explain that discrepancy is if she planned to manipulate me into offering her the money she needed for her "procedure'. When I discovered root malware on my PC it became obvious that she had planted spyware on my computer. The hacking in November had been a last ditch brute force attempt by her and her boyfriend to steal the money from me. They had still failed, but only just.
In February 2025, I began the task of compiling evidence, tracing the digital footprint of the attacks, correlating timelines, screenshots, messages and emails. On the 13th of April 2025 I laid formal counter-charges with the South African Authorities and then launched my own private investigation. What began as forced self-defense turned into a mission to expose what really happened and took me down a long path of discovery. It made me realize just how thoroughly I had been played for an idiot. But I knew now what I needed to do. My efforts were soon noticed.
In late April 2025, five months after she and Dom had hacked my accounts I received a letter from her new employer's lawyers. It accused me of defamation for a message I had allegedly sent eight months earlier, a message they refused to, or couldn't produce. It was clearly a desperate attempt to intimidate me into silence, engineered by L.O. and using her employers company resources for her personal benefit. I was supposed to feel intimidated. I sent the letter back, unsigned. They had tried to scare me.
They failed.
The Aftermath is not the end of the story. It's just the point in the story where the victim decided to stop being one.
The narcissist L.O. was saving screenshots long before I was and using them to blackmail me. Yet she is forever crying foul that destroyed her privacy by taking screenshots or our chats.