Advanced DIY Privacy for Every Woman
  • Introduction
  • Before we start
  • 1 - Identify your security risks
  • Security areas to prioritise
  • 2- Document security violations
  • Safety and security strategies
  • Securing a mobile phone or a tablet
  • FAQ on mobile phones
  • Securing your laptop/other connected devices?
  • 3 - Securing your connections
  • 4 - Securing your apps, software and internet services
  • 5 - Browsing the web
  • Social engineering and phishing
  • Internet browser, search engine and passwords
  • IP address, WIFI and emails
  • Social media: what to pay attention to!
  • Facebook, Twitter, Google, Foursquare
  • Apps and internet enabled apps
  • Online banking, billing account and other accounts
  • Protection measures
  • 6 - Documenting privacy violations
  • Voice calls and keeping a diary
  • 7 - Advanced security resources
  • Anti-virus, Firewall and Spyware
  • Secure internet browsing
  • Authentification
  • Encryption
  • Deleting your information
  • 8 - Glossary
  • How we put this guide together
  • Final words
Powered by GitBook
On this page
  • Cross-cutting best practices
  • Securing your devices

Safety and security strategies

Now that you have identified your vulnerabilities and are prepared to document your abuser, let’s get into security strategies you can begin implementing TODAY to thwart your stalker.

Although everyone’s vulnerabilities will be slightly different, this advice has been written for someone suffering from a moderate degree of stalking.

We’ve also included advice for people at high-risk, cases in which your abuser's skills, resources, connections, or corrupt national policing\/surveillance systems, makes it easier to track you online.

Cross-cutting best practices

Sending information via the internet, either through a computer or through your mobile phone, has the risk of compromising your safety.

Mobile phones and computers store all sorts of data, like your call history, text messages sent and received, documents, calendar, address book information, photos, video clips, and text files.

Furthermore, your social media presence, email, and websites visited reveal further information about you that a stalker could use to their advantage. In the wrong hands, your contacts, movements, preferences and likes could make you very vulnerable.

Therefore, the more technology you use, from apps to devices and everything in between, the more responsible you should be with your data. But don’t fear - the following information will help you take steps to ensure your devices and information are as secure as possible.

Securing your devices

All of the following applies to you, any children you may have, anyone that has stayed in the same house as your abuser, or anyone whose devices are accessible by them.

  1. When possible, keep your devices safe or in your possession at all times to ensure that they do not fall into the wrong hands (i.e. mutual contacts you share with your abuser).

  2. Use complex passcodes that are unlikely to be guessed. Where possible, use two-step verification (see the Reference section at the end of this guide).

  3. Store as little data as possible on your phone.

  4. Remember that no phone is 100% secure. If your abuser can track you, consider leaving your phone at home, or use a disposable phone.

Previous2- Document security violationsNextSecuring a mobile phone or a tablet

Last updated 7 years ago