
This document aims to help you avoid getting into trouble. It is much easier to prevent cybersecurity issues than clean them up.
If you have an immediate problem that you need to fix right now, then you want this document instead:
Come back and read this later when things have calmed down
I am an IT professional and can help people secure their devices and accounts. I am not trained in welfare or domestic violence.
If you are a person experiencing domestic violence or at risk of domestic violence, you should reach out to support services, such as:
Below is cybersecurity advice for security your devices and accounts, minus all the bullshit. While this information is good advice for anyone, it aims to help people at risk of domestic violence.
This information is designed to help you reduce the risks of being harmed, not sell some useless security software or offer simplistic advice such as "set a good password". It's blunt, realistic and honest.
Before I cover technical stuff, there are a few things to keep in mind when considering your personal cybersecurity.
There is strong social pressure to not take cybersecurity seriously. Most people see it as a pain in the ass and think people taking it seriously are odd or paranoid.
Do your best to ignore this, and never let it be a reason for weakening your cybersecurity.
Securing technology is a hassle. It makes it harder to use devices, harder to access websites or services. Everything becomes annoying. Sadly, that doesn't make any of this advice less true.
Reading this, it might feel over the top and taking things too far. If you want to secure technology and protect your personal safety, this is what it takes.
Inconvenience is the biggest obstacle to cybersecurity. The second is cost. When you hear about a corporation or government department being "hacked", inconvenience and cost is the root cause. It's not that it's technically difficult, it's that nobody thought the security was worth the hassle. Until it was.
Fortunately, cost won't be an issue in your case. The solutions required to securing personal devices and accounts are either free or cheap.
I don't want to bury you in useless technical details in this article. If you are interested, I will explain the reasoning for some advice at the end.
I have separated all the advice into two scenarios;
The reality, is that sometimes you just can't take action/advise to secure your devices and accounts. If you are threatened with violence, then “use a long, complex password” is pointless advice. In these cases, I have tried to identify a fallback strategy. Sadly, there are limited options, and they mostly involve keeping things hidden, rather than secure. In cybersecurity, we call this “security through obscurity” and it is the weakest for of security you can have.
Set personal boundaries and expectations about technology and security very early on, with everyone.
Friends, family, partners. From the first date to random hookups, the rules must be the same.
Don't let these boundaries drop as the relationship becomes serious/stable.
Domestic violence is far more likely to start 6 to 12 months after a relationship is established, rather than straight away. Right when you are dropping your guard, and you've given people access.
Abuse of technology can often appear harmless or get brushed off as not being important. Common signs that you are a victim of abuse through your technology are:
These are all acts of coercion or maliscious attempts to use your devices. If you are experiencing this, then there is a real risk your devices are being used against you and you cant trust those devices.
It is extremely difficult to secure a device, once someone else has physical access to it. So step one in security is:
Don't let people touch your devices.
Which is far easier said than done, but we have to start with this.
The rule is: Nobody touches/uses your devices.
If you are living in a house with an abuser, limiting access to devices is extremely difficult. Abusers are likely to use coercive control, emotional/verbal abuse and physical violence to get access to the device.
Once you are in this situation, you need to give up on physical control and fall back to the next section, Device Locks.
Modern devices come with a range of security features, and they work very well. Unfortunately, most people don't use them because it is inconvenient.
As above, set boundaries and expectations very early on. The rule is: Nobody gets to unlock your devices but you. No excuses.
It is not always possible to use lock screens or keep the lock screen method secret. Passwords are useless if someone is willing to harm you to get them. In this situation, you need to fall back on other security methods I will outline below.
Do not access your accounts, on devices you don't own. It is trivial for someone to monitor your activity on a device they own/control. From websites, chat apps to recording every single character you type.
You should assume any device or computer you don't own is recording everything you type. Especially if that device belongs to your abuser.
This applies to any shared family devices such as a child's iPad or a family computer/laptop. These types of devices can not be trusted.
Don't let your children use your devices. Ever.
When you are in a hurry to leave a location, you likely won't have time to secure your devices. If you have a Faraday bag, then you can put your devices in it to protect yourself from tracking software.
These bags block radio signals such as GPS, 4/5G, Wi-Fi and Bluetooth.
They are relatively cheap, and you can get them from regular sites like Amazon. They tend to look like a laptop pouch and dont stand out.
You can get items such as this: https://amzn.asia/d/gJ8jqga"
Faraday Bag on Amazon.com.au
If you dont have one and need to lockout a signal, wrap your devices in aluminium foil. Make sure you cover the entire device.
It's not perfect, but it works.
If you have concerns about your device having unwanted apps or some maliscious change, the best option is to erase it. This is relatively easy and quick. With so many devices out there, I cant cover the details, but you should look it up so that if you need to erase the device you can.
There are however some important things to consider before doing so.
You should always make sure that your photos are being backed up by some kind of cloud service. With Android phones this is typically Google Photos, with iPhones it is iCloud.
You want to make sure your contacts are available in an emergency. This means that your phone address book should be synced with Google contacts or Apple Contancts.
Do NOT store contacts on your phone or worse on the sim card. If you erase the phone, you end up erasing your contacts.
Phone apps from legitimate stores like Google Play or Apple Store are very rarely maliscious. The stores scan apps for malware and any issues tend to be identified and resolved very quickly.
There are however some apps to watch out for.
These are legitimate apps and are approved by the stores, but can be used against you.
These are apps such as baby monitors, webcam software, find my phone apps and child monitoring apps. They are not designed to be covert tracking software, but if you dont notice them, they can be used that way.
Phones can have apps manually installed by using a downloaded file. This capability is dissabled by default and there is no legitimate need for a regular person to turn that protection off. This setting is turned on by software developers when testing their apps or by people who have more advanced tech skills.
Regular users should only install apps from the apps store!
Manually installed apps can be designed to run silently, prevent you getting notifications or removing the software. They are often advertised as "anti cheating" apps or partner monitoring apps.
The easiest way to spot this is to check if manual app installs are allowed. If this is on, then you should dissable it and factory reset the phone. Check in these two places:
There are three categories of online accounts you need to deal with.
Companies such as Facebook, Google, Instagram provide very secure authentication services and have dedicated security teams to protect their computer systems. Their security is extremely strong.
The reality is, that nobody hacks Facebook, Gmail or Apple accounts. The media hypes it up but what actually happens is that the person had very poor personal security. Generally people get access to their accounts because of:
If you have a good password on one of these services, then most people are safe.
In this instance, though, you should take additional steps to protect your accounts.