Advanced DIY Privacy for Every Woman
  • Introduction
  • Before we start
  • 1 - Identify your security risks
  • Security areas to prioritise
  • 2- Document security violations
  • Safety and security strategies
  • Securing a mobile phone or a tablet
  • FAQ on mobile phones
  • Securing your laptop/other connected devices?
  • 3 - Securing your connections
  • 4 - Securing your apps, software and internet services
  • 5 - Browsing the web
  • Social engineering and phishing
  • Internet browser, search engine and passwords
  • IP address, WIFI and emails
  • Social media: what to pay attention to!
  • Facebook, Twitter, Google, Foursquare
  • Apps and internet enabled apps
  • Online banking, billing account and other accounts
  • Protection measures
  • 6 - Documenting privacy violations
  • Voice calls and keeping a diary
  • 7 - Advanced security resources
  • Anti-virus, Firewall and Spyware
  • Secure internet browsing
  • Authentification
  • Encryption
  • Deleting your information
  • 8 - Glossary
  • How we put this guide together
  • Final words
Powered by GitBook
On this page
  • IP address
  • WI-FI
  • Emails
  • Email attachments
  • Email links
  • Email servers

IP address, WIFI and emails

PreviousInternet browser, search engine and passwordsNextSocial media: what to pay attention to!

Last updated 7 years ago

IP address

An Internet Protocol (IP) Address is a a unique numerical identifier assigned to a machine on a network. You can view you own your IP Address .

VULNERABILITIES

  1. An IP address reveals your ISP (internet service provider)

  2. If the abuser has your IP address, there is a possibility of being hacked

  3. Many web sites will store and track activity coming from your IP address. They may use this information to customise ads according to your internet activity and your location.

ACTION

WI-FI

Local area wireless computer networking technology

VULNERABILITIES

  1. Easy to hack into Wi-Fi and gain access to devices, especially if using a public network (in a cafe or library)

  2. Phishing is very easy on a public Wi-Fi connection. Untrusted public Wifi connections may be used for phishing (ie if the attacker controls the network the victim connects to).

ACTION

  1. Don’t join Wi-Fi networks that do not require a password.

  2. Be careful of all WiFi networks that you do not control or explicitly trust.

  3. Get a VPN (Virtual Private Network) - see References

Emails

Opening emails from your stalker

VULNERABILITIES

  1. Email add-ons/extensions

  2. The abuser could send email impersonating other people

  3. Spyware

  4. Find My Phone apps

  5. Tracking app

  6. Could attach a bug to your device

ACTION

  1. Block their email address

  2. Never open their emails

  3. Never reply to their email, - this can give them information to track

  4. Don’t trust the sender “name”: check the email address and be suspicious about strange emails

Email attachments

VULNERABILITIES

Attachments can contain spyware or tracking software

ACTION

Don’t open or download attachments you’re not expecting

Email links

VULNERABILITIES

Links in emails can take you to websites that are also designed to download malware/phishing sites

ACTION

Email servers

VULNERABILITIES

  1. Tracking through account

  2. Location settings show your location when you send an e-mail

ACTION

High threat level: Get rid of your current account and set up a new one

Use a Virtual Privacy Network, ,

Get a hardware/software Firewall - Use a router here.

Don’t click on links in emails if you can help it. See and

Encrypt all emails, by using an encrypted email provider, such as or . For ease and simplicity we recommend .

Install a plugin which encrypts your emails i.e. mailvelope ()

Use and select the OpenPGP option to encrypt your email. See .

IPredator
Riseup
Learn How To Set-Up A Wireless Router
How to Check Emails for Fake Hyperlinks
How to Test a Suspicious Link Without Clicking It
Tutanota
mailvelope
Virtru
How To Use Mailvelope
Thunderbird
encrypt your email with PGP
here