Resources

Privacy Tech Proton VPN VPN Comparison Chart – If you like to do a little research on your different options. Please see the caveats in the chart. DV, Anti-Harassment, Assault & Stalking Resources Digital Evidence Guide – A resource to help victims of DV...

People Searches & Data Opt Out

This information is not legal advice and is for educational purposes only. Please consider your own situation, safety, and ability to do any/all of these things. Not everything will apply to you. When it comes to people being able to doxx you on the internet with...

Financial Security Checklist

This information is not legal advice and is for educational purposes only. Please consider your own situation, safety, and ability to do any/all of these things. Not everything will apply to you. When you’re putting together a go-bag or resources, whether for a...

Online Privacy & Controlling Your Data

To better understand your online privacy and what that means, let’s first define privacy & security for this article. Privacy is the ability for an individual or group to limit the amount of information people can learn about you. Security prevents...

Detecting & Removing Stalkerware

What is Stalkerware? Stalkerware is monitoring software or spyware, such as apps, software programs, and devices that allow another person to secretly monitor your phone, tablet, computer or device activity. Stalkerware apps and software is often pitched by the...

Back to School Safety & Child Identity Theft

Back to School Safety & Child Identity Theft: Why You Should Care It’s back to school season, and the urge to take your child’s first day school photos and put them all over social media is strong. You’re proud of your kids, you want to show their growth, and your...

Spot Patterns: Baseline Behaviors and Red Flags

What is a behavioral baseline? There are several descriptions for what constitutes a baseline level of behavior, however, the accepted understanding is the frequency, duration or intensity of a behavior. Alternatively, Psychology Dictionary describes behavioral...

How to Establish Secure Communications

You need Secure Communications if: You’ve been stalked or harassed You think your spouse or partner is spying on you You are a journalist or activist You are an executive or business owner concerned about privacy ***If you know someone who needs this now, PLEASE...

Data Removal/Opt-Out Resources

***Adapted from Intel Techniques. Please go here to download the data removal workbook they provide for free! (Updated 1 July 2022) Service: 411 Updated: August 2021 Website: https://411.com Removal Link: https://www.whitepages.com/suppression-requests Privacy Policy:...

Protect Yourself from Stalking & Harassment

I’m a Privacy Advocate and Private Investigator. Helping people handle cases of stalking or harassment is part of what I do, and how I help protect people. There are a lot of factors to consider when protecting yourself online, and in the physical world. The...
Subscribe To the Security Round-Up

Subscribe To the Security Round-Up

Get the latest privacy & security tech highlights, straight to your inbox! Plus a little snark with it. :)

You have Successfully Subscribed!