Guide:Resisting technological domestic abuse: Difference between revisions

no edit summary
No edit summary
No edit summary
Line 17:
This will prevent them from finding this guide in your history and being aware of the advice you're following.
= Methods and countermeasures =
==CreepwareStalkerware==
{{Image frame
Potentially most concerning method the perpetrator could use is installing [[w:creepware]] on your devices. Creepware are apps that are designed to keep track of another's activity
|content=
<youtube>zLtfoCw16Z0</youtube>
|caption=[https://stopstalkerware.org/ Coalition Against Stalkerware]'s brief overview of stalkerware.<br>
'''Remember to open in Private/Incognito mode to avoid leaving a trace!''' <!-- Archive: https://web.archive.org/web/20201204090126/https://www.youtube.com/watch?v=zLtfoCw16Z0 -->
|align=right
}}
Potentially most concerning method the perpetrator could use is installing [[w:stalkerware|stalkerware]], also known as creepware, on your devices. Stalkerware are apps that are designed to keep track of another's person's activity and report it back to the perpetrator. Many of those apps masquerade as 'parental control' or 'employee monitoring' solutions, but most make little to no effort to limit he potential for abuse.<br>
These are very difficult to counter as they are designed to be stealthy and avoid detection, much like any other [[w:malware|malware]]. There are many stalkerware products, and new shady operations sprout all the time, but