Guide:Resisting technological domestic abuse: Difference between revisions

no edit summary
(adding images and media)
No edit summary
Line 84:
** you can, optionally, set it up to remember certain files. This is called persistence. It is generally safe to enable persistence (those files are encrypted as well), but if you do, you have to be sure to not disclose your encryption password
 
This point cannot be overstated, but <u>'''everything really depends on the strength of the encryption password you select'''</u> while creating a Tails USB stick. If you reuse a password that the perpetrator knows, you will be putting yourself at risk (particularly if you use persistence). For advice on how to come up with better passwords, see our advice on [[Passwords#Choosing_better_passwordschoosing better passwords]].
===Installing Tails===
[[File:Etcher-gif.gif|thumb|Installing (so-called, flashing) of Tails is really simple and can be done using a free program called Etcher. Just remember to remove it once you're done.]]
Line 92:
[[File:TAILS 4.14 ENG 05 01 2021 15 39 25.png|thumb|Once you start up Tails, it looks like any ordinary computer you've used before.]]
Using Tails is much like using any other desktop operating system. You have access to a browser, email client, and an office suite. You can connect to all your normal online services. It may look slightly differently, but don't let that intimidate you. 95% of the normal use of Tails is same as Windows or Mac.
=Taking back control and reasserting your privacy rights=
Below is a checklist of things you should review to ensure there isn't some hidden method by which the perpetrator continues to be in control of your technological or online life.
===Fundamentals===
If you're going to go through the effort, it is worth putting your future privacy at stronger foundational footing.
* Use a password manager.
* Think about your future passwords, and familiarise yourself with [[choosing better passwords]].
* Learn about [[2FA]] and consider using it.
* Start think about your devices and your accounts as what they are; an extension of your mind. You wouldn't let people read your mind, no matter how much you trusted them, so don't share your passwords with anyone, not even with people you trust now. Remember that sharing passwords is not a sign of trust, but paranoia.<br>
A trustworthy person will keep you trust whether or not you have means to verify their trustworthiness. This goes both ways.
===Devices===
Make sure your devices aren't still spying on you.
* Factory reset your mobile devices. This should eliminate 99% of all stalkerware.
<!-- TODO Add OS specific instructions.-->
* Reset (or reinstall if possible) your desktop operating system.
<!-- TODO Add OS specific instructions.-->
* Log out and/or delete any user accounts perpetrator may have used on all the devices.
* Round up all the electronic devices you don't recognise and dispose of them or at least turn them all off by unplugging them from power or removing batteries.
* Factory reset your router/gateway device. Perpetrator may have installed monitoring software.
** If you're not sure how, call your service provider; they will generally be able to walk you through the steps and help you reconnect.
===Websites and social media===
Take back your accounts.
* Change your account passwords and set new unique password for all sites and services you use.
** Pay particular attention to '''email and mobile phone''' provider's account as those are probably your [[Concept:identity anchor|identity anchor]]s.
** Remember to change your [[secret questions]] and check that the account recovery method isn't something the perpetrator can access.
* Find 'current sessions' screen (the one that shows all the currently logged devices) and either reset all login sessions or at least remove all unfamiliar sessions.
* Enable 2FA on every website that supports it.
* Block the perpetrator on social media.
** Make yourself harder to find on social media by setting your profile private or to undiscoverable mode.
===Other===
* Ask your financial institution to reissue your credit cards.
* Remove them from utilities or bills.
=Closing thoughts=
Although facing a perpetrator of domestic abuse is always difficult, please remember that domestic abuse is primarily and (anti-)social problem. No amount of technological knowledge and intervention can solve the fact that perpetrator is committing a crime by wiretapping your communications and that you may benefit from help by specialist services with resources and knowledge to help you in dealing with the perpetrator.