Advanced DIY Privacy for Every Woman
  • Introduction
  • Before we start
  • 1 - Identify your security risks
  • Security areas to prioritise
  • 2- Document security violations
  • Safety and security strategies
  • Securing a mobile phone or a tablet
  • FAQ on mobile phones
  • Securing your laptop/other connected devices?
  • 3 - Securing your connections
  • 4 - Securing your apps, software and internet services
  • 5 - Browsing the web
  • Social engineering and phishing
  • Internet browser, search engine and passwords
  • IP address, WIFI and emails
  • Social media: what to pay attention to!
  • Facebook, Twitter, Google, Foursquare
  • Apps and internet enabled apps
  • Online banking, billing account and other accounts
  • Protection measures
  • 6 - Documenting privacy violations
  • Voice calls and keeping a diary
  • 7 - Advanced security resources
  • Anti-virus, Firewall and Spyware
  • Secure internet browsing
  • Authentification
  • Encryption
  • Deleting your information
  • 8 - Glossary
  • How we put this guide together
  • Final words
Powered by GitBook
On this page
  • By CHAYN & friends
  • WHO IS THIS GUIDE FOR?
  • WHAT IS THIS GUIDE ABOUT?
  • HOW TO USE THIS GUIDE

Introduction

NextBefore we start

Last updated 7 years ago

By CHAYN & friends

“No matter what I did - he found me. Now I know how he did that... ”

“Wow, yes it really is an eye-opener!”

“This is the first time anyone's been able to shed any light at all on this - usual authorities seem to be clueless…”

WHO IS THIS GUIDE FOR?

Everyone, everywhere. Though written with women dealing with domestic abuse or stalking in mind, the guide and its principles can be used irrespective of gender, location or situation. Does someone have pictures of you and you don’t know how or why? Do they keep showing up unexpectedly to places where you are? Do they know things about your life that you haven’t told many people? Then you may be being stalked.

WHAT IS THIS GUIDE ABOUT?

Modern technology such as the internet/mobile phones etc., has made it increasingly easy for abusive partners to stalk, intimidate and threaten their targets both online and offline. The good news: you can take measures to protect yourself! Assess your risk and take back control with this guide of best practices.

HOW TO USE THIS GUIDE

There are many ways someone can track you down. The chance and ease of this happening will depend heavily on your personal circumstances and that of your abuser. This guide is not the complete answer.This guide doesn’t include all of the ways abusers can track someone, but it is a collection of tips and support including our best finds. Off you go!