Digital Safety Guide for Domestic Violence Survivors

When Your Ex-Partner Knows Too Much By Liz Howard, The Multiverse School


๐Ÿšจ Your Safety Comes First

If you are in immediate danger, call 911
National Domestic Violence Hotline: 1-800-799-7233 (SAFE)
Text "START" to 88788

Before You Begin:


๐Ÿ’œ You Are Not Alone, and This Is Not Your Fault

Technology-facilitated abuse is real. Your ex knowing your every move through technology is a violation, not paranoia. Studies show 85% of domestic violence survivors report technology-based harassment.

The experience of domestic violence is not limited to any gender, age, intelligence level, capability, race, geolocation, political leaning, ideological category, hormonal profile, mental health status, class, generation, or culture. It comes for us all. No matter who you are, you do not ever deserve to experience domestic violence, or an invasion of privacy.

Trust your instincts. If something feels wrong, it probably is.


๐ŸŽฏ Understanding Your Unique Threat

Your Ex-Partner Has Advantages Others Don't:

Common Tech Abuse Tactics:


๐Ÿ›ก๏ธ Phase 1: Immediate Safety Planning

A. Document Everything (Safely)

Use a NEW notebook that stays hidden:
- [ ] Write down all accounts you think they might access
- [ ] List all devices you've shared or they've touched
- [ ] Note any threats they've made about "knowing everything"
- [ ] Track strange occurrences with dates/times
- [ ] Keep receipts/screenshots of harassment

Photo evidence:
- [ ] Use a friend's phone or new device to photograph evidence
- [ ] Email photos to a new, secret email account
- [ ] Don't use your regular cloud storage

B. Safety Communication Setup

Get a burner phone ($30-50 at Walmart/Target):
- [ ] Pay cash if possible
- [ ] Don't activate at home
- [ ] Don't save contacts with real names
- [ ] This is your "safety phone" - guard it carefully
- [ ] Keep it OFF and battery out when not using
Note: I personally say "Burner phones aren't real" - this is only when threat-modeling the government.
IF your spouse is in law enforcement, get a friend to register the phone so they can't reverse-lookup whether you have any other registered phones.

Create a code system with trusted friend:
- [ ] "Thinking of you" = I'm okay
- [ ] "Let's get coffee" = I need help but not emergency
- [ ] "Can you pick up milk?" = Call 911 for me

You can change these phrases to match your normal patterns, these are just examples.


๐Ÿ” Phase 2: Breaking Their Digital Access

A. Assume Everything Is Compromised

They likely have access to:
- All passwords they've ever seen you type
- Your email (and thus password resets)
- Your location through various apps
- Your cloud storage and photos
- Your financial accounts
- Your social media
- Your kids' devices

B. Start Fresh, Stay Hidden

Order matters - do these in sequence:

1 Secure Physical Safety First

2 New Email Foundation

3 Financial Protection

4 Legal Documentation


๐Ÿ“ฑ Phase 3: Device Liberation

1 Phone Freedom

Signs your phone is compromised:

Nuclear Option (Recommended):
Order Matters - do these in sequence.

  1. [ ] Back up photos/videos to NEW account (not old cloud)
  2. [ ] Screenshot important texts (send to freedom email)
  3. [ ] Factory reset won't remove all spyware - get new phone if possible
  4. [ ] If keeping phone: Factory reset + don't restore from backup
  5. [ ] Start fresh with all new accounts
  6. [ ] Turn off ALL location services initially
  7. [ ] Review every app permission manually

App Audit:

2 Computer Cleanup

If they had access even once:
Order Matters - do these in sequence.

  1. [ ] Consider the nuclear option - fresh OS install
  2. [ ] At minimum, create new user account
  3. [ ] Check for remote access software (TeamViewer, AnyDesk)
  4. [ ] Review login items/startup programs
  5. [ ] Check browser saved passwords - they may have exported them
  6. [ ] Enable firewall
  7. [ ] Cover webcam when not using

C. Car Technology

Modern cars are computers:
- [ ] Check for aftermarket GPS devices
- [ ] Disable car's built-in WiFi/cellular
- [ ] Remove them from car's Bluetooth
- [ ] Check under seats, wheel wells, trunk for trackers
- [ ] Consider having mechanic check if very concerned
- [ ] Remove garage door opener if they have access


๐Ÿ‘จโ€๐Ÿ‘ฉโ€๐Ÿ‘งโ€๐Ÿ‘ฆ Phase 4: Special Considerations

1 Children's Devices

The hardest part - they're often used for monitoring:

2 Shared/Court-Ordered Communication

If you must maintain contact:

3 Social Media Lockdown


๐Ÿง˜โ€โ™€๏ธ Phase 5: Trauma-Informed Security

1 Managing Hypervigilance

You absolutely must manage the hypervigilance. Fear is a viscious cycle, and will keep you paralyzed. It is not about suppressing your fear- fear is located in the body. It is about managing the body, and the body's experience of fear.

It's exhausting being "on" all the time:
- Set specific times to check security (not constantly)
- Have a trusted friend help with reality checks
- Some paranoia is justified - trust yourself
- But also: not every glitch is them, they want you to be afraid, don't give in

2 Self-Care Security Balance

3 Building Your Support Network


๐Ÿ“‹ Quick Reference Checklist

Daily:

Weekly:

Monthly:


๐Ÿ†˜ Resources

Hotlines:

Helpful Websites:

Apps:


๐Ÿ’ช Remember:


Still Living Together?

Extra Precautions:
- Use library/work computers only
- Clear history after EVERY use
- Use private/incognito browsing
- Don't save passwords
- Consider a safety deposit box for documents
- Have "go bag" at trusted friend's house
- Practice your exit plan

Remember: Leaving is the most dangerous time. Plan carefully with DV advocates.


You are brave. You are strong. You deserve safety and freedom.


It is as the Bene Gesserit say:

"I must not fear. Fear is the mind-killer. Fear is the little-death that brings total obliteration. I will face my fear. I will permit it to pass over me and through me. And when it has gone past, I will turn the inner eye to see its path. Where the fear has gone there will be nothing. Only I will remain."

Contact: liz@themultiverse.school
Private support: https://jitsi.themultiverse.school

Delete browser history after reading. Stay safe. ๐Ÿ’œ