Guide:Resisting technological domestic abuse: Difference between revisions

no edit summary
(fix brackets)
No edit summary
Line 55:
 
The basic idea is that you give different version of an event, document or a plan (bait) via different methods of communication and see which one the perpetrator brings up. For example, if the perpetrator is attempting to control your social life, you might text one friend about plans to meet up for drinks, and email a completely different one to meet up for coffee at the same time. If the perpetrator now brings up you going for drinks, you know they're monitoring your texts, and probably not monitoring your email.
=====Device specific giveaways=tells====
======[[Android]]======
On Android, most stalkerware apps will not be found in the Play Store, as the are likely to be removed by Google upon identification. This means that most of the time, the perpetrator has to install an external app from so-called 'Unknown sources'. Normally, when you try to install an external app, Android phone will prevent you from doing so, unless you enable it in the settings before installing the app. Look for a setting called 'Unknown sources', and see if it is enabled for you. All Android phones come with it being turned off by default, so if it is on for you, and you did not enable it yourself, the perpetrator may have enabled it to facilitate installation of stalkerware.