Guide:Resisting technological domestic abuse: Difference between revisions

commenting out the warning, pending the discussion on the talk page. also restoring the more firm warning
No edit summary
(commenting out the warning, pending the discussion on the talk page. also restoring the more firm warning)
 
(One intermediate revision by one other user not shown)
Line 1:
{{Warning|1='''All the advice given below is followed at your own risk,. Do NOT follow the advice below if any of it will place you at risk of further harm, should you be discovered.'''<br /> Disclaimer: We are not domestic abuse experts and cannot make judgement calls regarding advisability of resisting the perpetrator given the prospect of further abuse. <br /> If you need further non-technical support, please reach out to one of the resources [[w:List of domestic violence hotlines|listed on this page]].}}
<!--{{Warning|'''The page needs to be cleaned up.''' <br>Reasons:<br>This page focuses on security such as 2FA and passswords more than privacy. Out-of-scope content should be removed or replaced. }}-->
{{TOC right}}
Purpose of this guide is to help victims of technological domestic abuse resist surveillance and recover from privacy or security compromise by perpetrators of abuse, whether romantic, familial or otherwise. <br />Technologically savvy perpetrators have more options than ever before to keep tabs on their victims, take away control and agency and continue abuse from afar. We will try to give you the tools and knowledge to resist technological aspects of the abuse, and once you're able to leave the abusive situation, recover from the privacy compromise.