Context profile

Profile: stalking or domestic abuse

This is an exceptional context profile. When the threat comes from an ex-partner, family member or someone you know, the threat model changes completely and safety comes before technical steps.

Profile: stalking or domestic abuse

Profile: stalking or domestic abuse

Safe reading: If you suspect your device or home network is being monitored, read this on a device the other person doesn’t know about — a library computer, a trusted friend’s phone, or an incognito window on a device only you use. Incognito hides your local browser history but not from your internet provider. Use Tor Browser for maximum anonymity.

Need help? In the Netherlands: Veilig Thuis: 0800-2000 (free, 24/7, anonymous). Police (non-emergency): 0900-8844. In other countries, search for your national domestic violence hotline.


This profile is fundamentally different from all others. The threat doesn’t come from an unknown government or anonymous hacker — it comes from someone you know, who may already have access to your devices, accounts, and physical environment.

That changes everything.

Treat this as an exception profile. Here, personal safety comes before the normal logic of base and context profiles.

Who this guide is for

This profile is for people whose threat comes from an ex-partner, family member, housemate, or someone else they know personally and who may already have physical, account, or social access.

With other profiles, you start with technical measures immediately. Here, you start with a plan. Unexpectedly changing passwords or deleting apps can escalate the situation. Safety comes before technical steps.

What you gain, and what it costs

If you follow this profile carefully, you usually gain:

  • a safer order of actions
  • less chance of escalating the situation accidentally through visible technical changes
  • a better chance of preserving evidence and personal safety at the same time

What it costs:

  • slowing down when your instinct may be to act immediately
  • using trusted devices, safer locations, or outside help
  • accepting that technical fixes alone are not the whole answer here

Step 1: Understand the threat model

Your adversary is fundamentally different from those in other profiles:

  • Physical access — they know your devices, may know your passwords
  • Existing access — shared accounts, known PIN codes, spyware already installed
  • Social network — they know your friends, family, colleagues — and can gather information through them
  • Motivation — control, not data. They want to know where you are, who you talk to, what you’re planning

Signs your device may be monitored:

  • Battery drains quickly without clear reason
  • Phone is warm when you’re not using it
  • Data usage is higher than expected
  • The other person knows things you only discussed or searched privately
  • Apps you don’t recognize are installed

Step 2: Plan before you act

Don’t take measures that could alert the other person until you’re ready to act completely.

Do this first, on a safe device:

  1. Contact a domestic abuse helpline for personal safety advice — they help you build a safety plan
  2. Make a list of which accounts are shared or known to the other person
  3. Note which devices they’ve had access to
  4. Plan when and from where you’ll take the technical step — this is the moment control ends, and it can trigger a reaction

Step 3: Technical measures — in order

Do this at a time and location that’s safe. Not from your shared home network if you want to avoid detection.

Email first Email is the key to all other accounts. Create a new address on a device the other person doesn’t know about (Proton Mail or regular Gmail — a clean start is the goal here).

Passwords

  • Change passwords in order: email → bank → social media → everything else
  • Use a password manager on a new device (Bitwarden or KeePassXC)
  • Use a different password everywhere — one found password can otherwise be tried on everything

Two-factor authentication

  • Enable 2FA on all accounts — start with email and bank — see 2FA guide →
  • Use an authenticator app (Aegis), not SMS — if the other person knows your SIM or can redirect your number, SMS 2FA is vulnerable

Disable location sharing

  • Google Maps: tap your profile photo or initial (top right) → Location sharing → check who sees your location
  • Apple: Settings → Privacy & Security → Location Services + Find My
  • WhatsApp: remove any active location shares
  • Check your car for GPS trackers and AirTags — both Android and iOS automatically alert you if an unknown tracker is travelling with you. On Android you can also manually scan using the Tracker Detect app from Apple.

End active sessions

  • Google: myaccount.google.com → Security → Your devices
  • Facebook/Instagram: Settings → Security → Where you’re logged in
  • WhatsApp: Settings → Linked devices

Devices

  • If you suspect spyware is installed: first check what’s on your device using the spyware detection guide — so you know what you’re dealing with before acting. A factory reset is the most reliable solution, but consult a domestic abuse helpline first. A reset can destroy forensic evidence that matters if you file a police report.
  • GrapheneOS on a Pixel gives you a device you fully control — or use an iPhone with maximum privacy settings as an alternative: iPhone privacy settings
  • If a factory reset isn’t immediately possible: use a different device for sensitive communication

Communication

  • Signal for contact with people you trust — configure it properly: disappearing messages, hiding your phone number, and restricting notifications. If you want no trace at all, use SimpleX instead.
  • SimpleX Chat if the other person has your phone number — no phone number required, no account, no identifier that links back to you. The other person cannot see you’re using the app. SimpleX Chat guide →
  • New phone number if the other person has your current number — this also breaks WhatsApp tracking
  • Use new communication channels only on devices and networks the other person doesn’t know

Physical safety

Technical measures protect you digitally, but location information can leak in other ways too:

  • Tell trusted people where you are — but not through channels the other person can see
  • Check your belongings and clothing for trackers (AirTags are small and can be placed anywhere)
  • Turn off location access for your camera app — photos can contain location data

Help and resources

OrganisationWhatContact
Veilig Thuis (NL)Advice, safety plan, referral0800-2000 (free, 24/7)
Police (NL)Report stalking or threats0900-8844 (non-emergency) / 112
Helpwanted.nl (NL)Online threats and stalking, up to age 26helpwanted.nl
Slachtofferhulp Nederland (NL)Legal and practical support for victimsslachtofferhulp.nl
Safety Net (international)Tech safety resources for abuse survivorstechsafety.org
National DV Hotline (US)24/7 crisis support1-800-799-7233

Next step

Start here

Also relevant

Reviews and further reading