Guide:Resisting technological domestic abuse: Difference between revisions

commenting out the warning, pending the discussion on the talk page. also restoring the more firm warning
(commenting out the warning, pending the discussion on the talk page. also restoring the more firm warning)
 
(5 intermediate revisions by 3 users not shown)
Line 1:
{{Warning|1='''All the advice given below is followed at your own risk. Do NOT follow the advice below if any of it will place you at risk of further harm should you be discovered.'''<br /> We are not domestic abuse experts and cannot make judgement calls regarding advisability of resisting the perpetrator given the prospect of further abuse. <br /> If you need further non-technical support, please reach out to one of the resources [[w:List of domestic violence hotlines|listed on this page]].}}
<!--{{Warning|'''The page needs to be cleaned up.''' <br>Reasons:<br>This page focuses on security such as 2FA and passswords more than privacy. Out-of-scope content should be removed or replaced. }}-->
{{TOC right}}
Purpose of this guide is to help victims of technological domestic abuse resist surveillance and recover from privacy or security compromise by perpetrators of abuse, whether romantic, familial or otherwise. <br />Technologically savvy perpetrators have more options than ever before to keep tabs on their victims, take away control and agency and continue abuse from afar. We will try to give you the tools and knowledge to resist technological aspects of the abuse, and once you're able to leave the abusive situation, recover from the privacy compromise.
Line 14 ⟶ 15:
}}
<br>
 
= Core assumptions =
In this guide we are assuming following:
Line 43 ⟶ 45:
If you answered yes to any of those, you may be a victim of stalkerware.
===Countermeasures===
* If you can, do not allow physical access to your device. Do not leave your device unattended. Most stalkerwirestalkerware has to be instlledinstalled using physical access, so if you're not infected, this is the best method to keep it that way.
** Use a strong screen lock method, and do not use fingerprint scan or face unlock (as those methods are rather easily fooled). There is no substitute for a [[Choosing better passwords|good password]].
* Most stalkerware programs run in the background all the time, using your battery (if applicable). Be mindful of your battery performance, particularly if it suddenly drops.
Line 60 ⟶ 62:
[[File:Cydia logo.png|thumb|Cydia app store logo]]
Apple, like Google, also actively removes stalkeware apps from its store. To install external apps on iOS devices, generally the device has to be [[w:jailbroken|jailbroken]] (basically, unlocked to enable non-Appstore apps). Most jaibroken devices have an alternative app store on it, called Cydia. If your device has Cydia on it, but you did not jailbreak the phone yourself, you might be a victim of stalkerware.
 
===Should you remove stalkerware?===
We cannot say, given that this depends on your personal circumstances. The perpetrator is very likely to notice this, and if attempting to resist may result in further abuse, it may not be advisable.<br>