IP address

An Internet Protocol (IP) Address is a a unique numerical identifier assigned to a machine on a network. You can view you own your IP Address here.

VULNERABILITIES
  1. An IP address reveals your ISP (internet service provider)
  2. If the abuser has your IP address, there is a possibility of being hacked
  3. Many web sites will store and track activity coming from your IP address. They may use this information to customise ads according to your internet activity and your location.
ACTION
  1. Use a Virtual Privacy Network, IPredator, Riseup
  2. Get a hardware/software Firewall - Use a router Learn How To Set-Up A Wireless Router here.

WI-FI

Local area wireless computer networking technology

VULNERABILITIES
  1. Easy to hack into Wi-Fi and gain access to devices, especially if using a public network (in a cafe or library)
  2. Phishing is very easy on a public Wi-Fi connection. Untrusted public Wifi connections may be used for phishing (ie if the attacker controls the network the victim connects to).
ACTION
  1. Don’t join Wi-Fi networks that do not require a password.
  2. Be careful of all WiFi networks that you do not control or explicitly trust.
  3. Get a VPN (Virtual Private Network) - see References

Emails

Opening emails from your stalker

VULNERABILITIES
  1. Email add-ons/extensions
  2. The abuser could send email impersonating other people
  3. Spyware
  4. Find My Phone apps
  5. Tracking app
  6. Could attach a bug to your device
ACTION
  1. Block their email address
  2. Never open their emails
  3. Never reply to their email, - this can give them information to track
  4. Don’t trust the sender “name”: check the email address and be suspicious about strange emails

Email attachments

VULNERABILITIES

Attachments can contain spyware or tracking software

ACTION

Don’t open or download attachments you’re not expecting

VULNERABILITIES

Links in emails can take you to websites that are also designed to download malware/phishing sites

ACTION

Don’t click on links in emails if you can help it. See How to Check Emails for Fake Hyperlinks and How to Test a Suspicious Link Without Clicking It

Email servers

VULNERABILITIES
  1. Tracking through account
  2. Location settings show your location when you send an e-mail
ACTION
  1. Encrypt all emails, by using an encrypted email provider, such as Tutanota or mailvelope. For ease and simplicity we recommend Virtru.
  2. Install a plugin which encrypts your emails i.e. mailvelope (How To Use Mailvelope)
  3. Use Thunderbird and select the OpenPGP option to encrypt your email. See encrypt your email with PGP.


High threat level: Get rid of your current account and set up a new one

results matching ""

    No results matching ""