Guide:Resisting technological domestic abuse: Difference between revisions

no edit summary
(creating page)
 
No edit summary
Line 7:
** The perpetrator also controls your internet access, either by controlling the router or controlling the ISP account.
* The perpetrator is generally more technologically savvy than you.
* The perpetrator is willing to deploy technological measures that are generally unacceptable, such as tracking your location, monitoring your search history, compromising your social media accounts and so on.
= But first =
If you share the device you're reading this on with the perpetrator, DO NOT allow them to use your browser history to find out about your attempts to resist.<br />
Line 15:
<!--TODO: Add browser specific instructions here.-->
This will prevent them from finding this guide in your history and being aware of the advice you're following.
= Methods and countermeasures =
==Creepware==
Potentially most concerning method the perpetrator could use is installing [[w:creepware]] on your devices. Creepware are apps that are designed to keep track of another's activity