DIY Online Safety
  • Do-It-Yourself Online Safety
  • English
    • Being tracked?
    • Risks
    • Set a killer pawsword
    • Pawtech the browser
    • Social media
    • Final words
  • Français
    • Lis...
    • Comment es-tu surveillée ?
    • Faire le bilan des risques
    • Configurer un mot de passe qui déchire
    • Comment prrrrrotéger (ok.. Protéger) ton navigateur
    • Options de sécurité pour les réseaux sociaux
    • En clôture
  • Urdu اردو
    • تعاقب
    • خطرات/خدشات
    • بہترین پاسورڈ
    • براؤزر
    • سوشل میڈیا
    • خلاصہ
  • Arabic عربی
    • رزمة المُبتدئ
    • المخاطر
    • كيف تقومين باختيار كلمة سر قويّة وآمنة
    • كيف تحمي متصفّحك؟
    • إعدادات خصوصيّة التواصل الاجتماعي
    • في النهاية
  • Español Spanish
    • ¿Cómo te pueden estar siguiendo el rastro?
    • Riesgos
    • Cómo crear una contraseña infalible
    • Haz lo que sientas que es necesario para sentirte segura y mantenerte a salvo.
  • русский
    • Читать...d
    • Делайте всё, что считаете нужным для сохранения Вашей безопасности
    • Как установить убийственный пароль (сорри...мы не могли удержаться)
    • Как защитить Ваш браузер?
    • Расширения браузера Расширения браузера (Дополнения/плагины), это программы, которые расширяют или о
    • Как Вас отслеживают?
  • Italian Italiano
    • Sommario
    • Come si può essere pedinate online
    • Valuta i rischi
    • Come creare una password blindatissima
    • Come proteggere il tuo browser
    • Social media e apparecchi elettronici
    • Consigli finali & ringraziamenti
  • Farsi فارسی
    • گشت و گزار های روزانه شما روی براوسرهای انترنتی
    • سعئئشقغ
    • ختم شد
    • چگونه می شود رمز کشنده ای انتخاب کرد؟
    • چه قسم براوسر تان را محفوظ نگه دارید؟
    • تنظیمات حریم خصوصی رسانه های اجتماعی
    • خطرات
  • Pashto پښتو
    • تاسو څنګه تعقیبیږئ؟
    • خطرونه
    • قوي پسورډ
    • چه قسم براوسر تان را محفوظ نگه دارید؟
    • د ټولنیزو رسینو محرمیت تنظیمات
    • موږ هيله لرو چې تاسو زموږ د لارښود خوند!
Powered by GitBook
On this page
  • 1. Identify your security risks
  • 2. Assess the strength of your security practices
  • 3. Security areas to prioritise
  1. English

Risks

PreviousBeing tracked?NextSet a killer pawsword

Last updated 6 years ago

1. Identify your security risks

You should take as much care to protect your online presence as you do with your physical one. Securing your online presence is crucial to health and happiness; if someone intrudes upon our online space, it is easy to feel violated.

2. Assess the strength of your security practices

Ask yourself:

WHO? is your stalker/abuser? Do you know the abuser? Is the abuser connected to you? Are they financially resourceful? Politically/socially influential? Do they know how to use technology?

WHERE? Does your environment increase the threat? What are the laws and policies enforced? What are the cultural norms of your abuser’s community, family or your own?

If you don’t know, try talking to people you trust to get information from them. If it is difficult to obtain information about safety and privacy laws, it is likely that they are either non-existent or weakly enforced, so your environment increases the threat.

HOW? Is it easy to bribe someone where you live? Can your abuser use their economic/social influence to access your information? Does your abuser have power over your relatives?

3. Security areas to prioritise

.

Only YOU know what devices you use, what apps and services you access, how you use them and what you use them for. Take that context into account to decide what strategy to use and remember that it may require a change in behaviour or some level of inconvenience, so choose the strategy and recommendations that best suit your situation.

Devices and apps

Select carefully what device, app or network you trust with your information. Remember your mobile phone and laptop are likely to be collecting your data, which could be shared with service providers or could be maliciously accessed by a hacker.

Your connections, applications and services may be insecure, may have been compromised, could be used to monitor your activity.

Email account

It is at the centre of everything you do online, such as other accounts you create on other websites, social-media platforms,etc… If your email is compromised, it puts at risk all of your other accounts and data.

Spyware

Your phone can be set to record and transmit any sounds within the range of its microphone without your knowledge. Some phones can be switched on remotely and brought into action in this way, even when they look as though they are switched off.

Take the Privacy Test by Smart Privacy