Search for “How to spy on my spouse” on the internet (or replace “spouse” with “lover”, “girlfriend”, or “boyfriend”) and it reveals a disturbing reality. There are scores of results for persons who suspect their partners of infidelity, or are frustrated and heart-broken over an unexpected or messy…
Note: Searching for, removing or disabling the means of stalking may alert the stalker. This may potentially cause the abuse to escalate, pose a risk to the target’s physical safety, and close their avenues to seek help or exit the relationship. If you are someone experiencing stalking or…
This is the third article in this series. The previous articles explained stalkerware and how it may lead to image-based abuse, some popular techniques of stalking that involve commonly used apps, features, online services and devices, and potential countermeasures to them. Note: Searching for,…
Be safe
Photo by Jon Feinstein
What privacy & anonymity have to do with tech-related VAW
Anonymity and digital privacy are a critical part of human rights, but they are also connected to cyber crime, such as fraud, identity theft, cyber stalking, bullying, phishing and trolling. Survivors…
What data storage has to do with tech-related VAW
Dealing with incidents of tech-related violence involves reporting, investigating and collecting evidence. Collecting data is critical, as tech-related VAW is an increasing but under-analysed issue due to lack of valuable data. Record-keeping can…
Why it's important to know how to talk to survivors
People who are not trained to talk to survivors often say the wrong thing even when they mean well. Some people do not understand that violence online is equal to, and sometimes has an even greater impact than, violence offline. Survivors often…