Guide:Resisting technological domestic abuse: Difference between revisions

Clean up notice. Focused too much on security, and 2FA do have privacy problems that leaks your phone identifier or ...
No edit summary
(Clean up notice. Focused too much on security, and 2FA do have privacy problems that leaks your phone identifier or ...)
Line 1:
{{Warning|1='''All the advice given below is followed at your own risk, if any of it will place you at risk of further harm, should you be discovered.'''<br /> Disclaimer: We are not domestic abuse experts and cannot make judgement calls regarding advisability of resisting the perpetrator given the prospect of further abuse. <br /> If you need further non-technical support, please reach out to one of the resources [[w:List of domestic violence hotlines|listed on this page]].}}
{{Warning|'''The page needs to be cleaned up.''' <br>Reasons:<br>This page focuses on security such as 2FA and passswords more than privacy. Out-of-scope content should be removed or replaced. }}
{{TOC right}}
Purpose of this guide is to help victims of technological domestic abuse resist surveillance and recover from privacy or security compromise by perpetrators of abuse, whether romantic, familial or otherwise. <br />Technologically savvy perpetrators have more options than ever before to keep tabs on their victims, take away control and agency and continue abuse from afar. We will try to give you the tools and knowledge to resist technological aspects of the abuse, and once you're able to leave the abusive situation, recover from the privacy compromise.