NEXT 6 STEPS (Low‑Visibility Mode)

1️⃣ Gather intel only (no changes yet) On your iPhone: 📌 Don’t remove anything yet. Just observe and note. 2️⃣ Reduce signals without alerts These don’t usually trigger reactions: Think: less data leakage, no alarms. 3️⃣ Create a clean escape lane (off this phone) From a safe device (friend/work/library): This is your control switch for later. 4️⃣ Choose the “quiet window” Pick a… Read More NEXT 6 STEPS (Low‑Visibility Mode)

If the answer is NO: DO NOT secure the phone yet

When someone may be monitoring you, sudden changes (passwords, location, Apple ID) can: So we switch to containment + safety, not lockdown. 🟠 PHASE 1 — Stay invisible (for now) What to do immediately ✔️ Do nothing that changes access ✔️ Act normal Your goal is not to win, it’s to buy safety and time. 🟠 PHASE 2 — Quiet preparation (off… Read More If the answer is NO: DO NOT secure the phone yet

WHEN to secure your iPhone (ex‑partner = YES)

🔴 DO NOT act immediately if: In those cases, we prepare first. 🟡 PREP PHASE (do this quietly, first) Timeframe: Today / next 24–48 hours From your iPhone: Also: 📌 This phase is about information, not action. 🟢 SAFE WINDOW to act Best time to secure everything: This reduces retaliation risk. 🔐 ACTION PHASE (all at once, during safe window) When you… Read More WHEN to secure your iPhone (ex‑partner = YES)

If the answer is YES, then timing is everything. We move quietly and in stages, not all at once.

Here’s WHEN to act, step by step. 🕰️ WHEN to secure your iPhone (ex‑partner = YES) 🔴 DO NOT act immediately if: In those cases, we prepare first. 🟡 PREP PHASE (do this quietly, first) Timeframe: Today / next 24–48 hours From your iPhone: Also: 📌 This phase is about information, not action. 🟢 SAFE WINDOW to act Best time to secure everything:… Read More If the answer is YES, then timing is everything. We move quietly and in stages, not all at once.

iPhone Safety Plan (Ex‑Partner Scenario)

⚠️ First rule Do NOT accuse, confront, or tip them off yet.If they are monitoring you, confrontation often escalates behaviour. 1️⃣ Use Apple’s built‑in Safety Check (this is designed for exactly this situation) 📱 Settings → Privacy & Security → Safety Check Choose “Manage Sharing & Access” (not Emergency Reset yet). This lets you: 👉 Do not rush to revoke everything if you’re worried… Read More iPhone Safety Plan (Ex‑Partner Scenario)

✅ Digital Evidence Collection Checklist

🔐 1. Secure Storage First Before you start collecting: 💬 2. Text & Messaging Evidence 📧 3. Emails 📞 4. Call Logs & Voicemails 📸 5. Photos & Videos 🧭 6. Social Media Evidence 🧑‍💻 7. Device Access & Hacking 💰 8. Financial Abuse or Fraud 📓 9. Personal Journal or Timeline 🛑 10. Safety First 🔒 Extra Tips

Survivor’s Guide: How to Protect Yourself from Tech Abuse in the Home

This guide is for anyone who suspects they are being digitally monitored, stalked, or controlled through home technology or smart devices. It offers a step-by-step checklist and templates to take back your digital safety. 🔒 Safety Checklist: Securing Your Home from Digital Surveillance ✅ Step 1: Secure Your Devices ✅ Step 2: Evaluate Your Tech… Read More Survivor’s Guide: How to Protect Yourself from Tech Abuse in the Home