Do you think your partner is cheating on you? If you find yourself in this situation, WhatsApp can give you a hand to find out the truth. Over the Internet, one technique to investigate if your wife or husband has cheated is spreading fast, but it is not 100% effective.
To find out if your partner is cheating, there is a popular method to use— yes! The enchaining WhatsApp. With WhatsApp, you can do more. Besides the already trendy method, which takes advantage of a little-known function of the application, there are two other ways that may confirm suspicions Find out if he (she) cheats on you:
Method 1
Scroll through the WhatsApp contact list and find out with whom your partner is mostly exchanging messages, images, and video clips. On WhatsApp, you can see the ranking of contacts with whom we chat more. Nobody exchanges many messages with a person who does not care. Remember to do in stealthily. It’s illegal!
You will see the ranking of friends with whom they chat most. Just take a quick look, and if you notice a suspicious contact, you decide how to go about it. Some would inquire, others would react. But come think of it, you are already invading their privacy, the latter would worsen things!
Method 2
The first method technique to discover a betrayal on WhatsApp has a limit: The partners could invent an excuse to justify all those chats with the person suspected. There is another way, though, that can bring out the truth. These are applications that allow you to spy on WhatsApp messages from another phone. You can read the partner’s messages and see all the photos and videos that she/he has sent. The problem is that using this type of app without the consent of the partner is illegal. The best thing, therefore, is to ask the partner as an “act of trust”.
Method 3
This method is as powerful as it is illegal. It is a fake message that you send to your partner pretending to be his/her lover, and then see how she/he responds and figure out if there will be any signs of infidelity. To put it into practice, you first need to run the method 1 and identify the suspect contact. If there is one, you can apply the “trap”.