Analyze your threat model & get professional IT help -
Click "Shop" > "Support Services" > "General IT Support"
Book an hour consultation at first to start sorting through your threat surface. Tell them "I believe I am being cyber stalked, I need help identifying the weak points in my network, home, and apps". Make sure you've done THIS first though: (Click here for mandatory first steps for online security!)
Hack resistant, de-G0-gled, no AI baked in and collecting ALL of your data EVER, and NO data transferring from data port when locked. Must have for previously cyber-stalked, hacked, compromised, or targeted individuals.
Note: This is a MAJOR shift away from how we have been using our cell phones - A lot of apps need to be left behind. But your peace of mind is PRICELESS and it is worth it.
Abusers only thrive if their victims stay silent. So DON'T.
Collect evidence, post it online with explanations about what you've been experiencing, turn your story into a success story and help others... Survivors thrive when we tell OUR side of the story, when we make others feel less alone, when we find our community and find support.
(Note: Educate yourself on the legalities of posting legal names, doxxing, etc - Don't get yourself into more trouble than you already are. But speak your truth, safely, and host it where they can't touch it. ((Make sure you have an encrypted password generator and keeper so they REALLY can't touch it / gain access to your site)).
Saving our passwords in our phone/cloud service or in our browsers was designed to help us... but now it only enables abusers to obtain the keys to our entire online lives.
This is an encrypted password generator and saver which you can pair with the tool to the right (Authenticator) to have safe, effective, and free password management that nobody can just copy in a moments notice off of your phone. MUST HAVE!
Another free utility that is an absolute must have for online safety. This tool will allow you to set up Multi Factor Authentication (meaning a second verification method when your important accounts are logged into, so someone just having your password isn't enough to obtain access)! This Authenticator syncs / works with your BitWarden password creator / manager so you can have everything all in one place. Very easy to use, super straight forward. :)
Having all of your emails, cloud accounts, and drives un-encrypted AND having them used as "Log in with (email provider)" on all of your social media accounts and other websites is how people end up with compromises that just won't go away.
Focusing on privacy and encryption is a great step towards making sure you can never be widely compromised again! Proton services are Swiss encrypted, unlike other free emails/drives, and they even have a free VPN that will hide your real IP address from marketers spying on you or hackers trying to get your info as you check your email! I use Proton services every day and I've never felt safer- Highly recommend!
Data Broker Removal Service
(coming soon)
There are people who make their money by selling your private data online, which means your full name, address, previous addresses, known associates, relatives, and sometimes even security question answers can be found online for FREE. Sounds like it should be illegal right? I agree, but unfortunately it isn't.
I am working on finalizing my official recommendation for data deletion services, as manually asking hundreds of websites to remove your data is time consuming and tedious. People who are suffering from abuse don't have the time or nervous system capability to do all of this work, and you shouldn't have to.
Check back here soon for an official recommendation for services that will help you make removing your data easy!
If your cell phone appears to be hacked, if you can't place phone calls out without interference, if every time you seek help you get retaliated against in some way... You can obtain a REALLY decent smart phone from TracFone and get service for under $200 (I have a discount code in the article for free points which you can use for an additional $10-$15 off your monthly service, too).
Click through to read more about this side phone technique to safely report your harassment. Important notes in this article are DO NOT connect this phone to your home wifi, DO NOT download ANY apps besides what are mentioned in this article, DO NOT sign in or sign up for the Samsung Cloud account it prompts you to sign up for, DO NOT sign into G--gle services or ANY of your old accounts.




