Advanced DIY Privacy for Every Woman
  • Introduction
  • Before we start
  • 1 - Identify your security risks
  • Security areas to prioritise
  • 2- Document security violations
  • Safety and security strategies
  • Securing a mobile phone or a tablet
  • FAQ on mobile phones
  • Securing your laptop/other connected devices?
  • 3 - Securing your connections
  • 4 - Securing your apps, software and internet services
  • 5 - Browsing the web
  • Social engineering and phishing
  • Internet browser, search engine and passwords
  • IP address, WIFI and emails
  • Social media: what to pay attention to!
  • Facebook, Twitter, Google, Foursquare
  • Apps and internet enabled apps
  • Online banking, billing account and other accounts
  • Protection measures
  • 6 - Documenting privacy violations
  • Voice calls and keeping a diary
  • 7 - Advanced security resources
  • Anti-virus, Firewall and Spyware
  • Secure internet browsing
  • Authentification
  • Encryption
  • Deleting your information
  • 8 - Glossary
  • How we put this guide together
  • Final words
Powered by GitBook
On this page

Final words

PreviousHow we put this guide together

Last updated 7 years ago

This guide is a project by , an open-source project that uses technology to empower women against violence and oppression so they can live happier and healthier lives.

The aim of this guide is to equip any person not overly familiar with technology to protect themselves against stalking and being tracked by someone that may harm them. This guide will focus on online stalking, but its companion guide focuses on how to deal with physical stalking.

This guide was created with female victims of domestic violence in mind. We aim to provide the reader with the necessary tools and knowledge to minimise the chance of being tracked by the abusive person(s) after having left the abusive environment. However, the guide can be useful to anyone who is being stalked or tracked online by an abuser, regardless of their gender, location or situation.

The content for this document is openly licensed using the. All are invited to share and adapt it as long as it is appropriately attributed and not used for commercial purposes. If you have any suggestions about how this guide can be made better or distributed more widely, please email us at team@chayn.co.

Thank you so much for collaborating with us. This will make a real difference to thousands of the world’s most vulnerable people.

We would like to thank our amazing partners and allies who have helped us by giving feedback and adding. We would like to thank all the CHAYN volunteers who helped put this guide together from different parts of the globe. We would also like to thank the many NGO’s and security geeks who helped shape this guide; Sara Baker of Take Back the Tech!, Nighat Dad, Jacquie Vernimont, Martin Shelton, Right2Know, Lawyers Against Abuse (LAA) and folks at Tactical Tech and Engine Room.

The CHAYN Team.

| |

CHAYN
Creative Commons (Attribution Noncommercial 4.0)
http://chayn.co
@ChaynHQ
team@chayn.co