440
edits
No edit summary |
(commenting out the warning, pending the discussion on the talk page. also restoring the more firm warning) |
||
(One intermediate revision by one other user not shown) | |||
Line 1:
{{Warning|1='''All the advice given below is followed at your own risk
<!--{{Warning|'''The page needs to be cleaned up.''' <br>Reasons:<br>This page focuses on security such as 2FA and passswords more than privacy. Out-of-scope content should be removed or replaced. }}-->
{{TOC right}}
Purpose of this guide is to help victims of technological domestic abuse resist surveillance and recover from privacy or security compromise by perpetrators of abuse, whether romantic, familial or otherwise. <br />Technologically savvy perpetrators have more options than ever before to keep tabs on their victims, take away control and agency and continue abuse from afar. We will try to give you the tools and knowledge to resist technological aspects of the abuse, and once you're able to leave the abusive situation, recover from the privacy compromise.
|