Relationship Red Flags
Controlling behaviour in relationships has moved online. Knowing the signs is the first step to staying safe.
Digital coercive control โ signs and examples +
Digital coercive control is when someone uses technology to monitor, control, intimidate, or isolate you. It is a form of domestic abuse โ even if there is no physical violence.
Common signs:
- They demand to know your phone password or check your messages regularly
- They track your location through apps like Google Maps or WhatsApp Live Location โ and get angry if you turn it off
- They insist on having access to your email, social media, or bank accounts
- They control which apps you can use or who you can follow / talk to online
- They send threatening messages, then delete them โ making it hard to prove
- They post private photos or information about you to embarrass or control you
- They impersonate you online (fake profiles) to monitor people who contact "you"
AirTag and Bluetooth tracker stalking +
Apple AirTags and similar small Bluetooth trackers (like Tile, Samsung SmartTag) are designed to find lost keys or bags. But they are increasingly used by stalkers to secretly track someone's movements.
How stalking via AirTag works:
- The tracker is secretly placed in your bag, car, jacket pocket, or attached under a vehicle
- The stalker's phone receives a continuous GPS location of wherever the tracker goes โ meaning wherever you go
- The tracker is tiny (about the size of a โน10 coin) and can hide anywhere
How to detect an AirTag:
- iPhone users: Your phone will automatically notify you if an unknown AirTag has been travelling with you. Take this alert seriously.
- Android users: Download the Tracker Detect app by Apple (free on Google Play Store). Run a manual scan of your bag, car, and belongings.
- Physically check your bag interior pockets, car wheel arches, under seats, and jacket pockets โ especially after visits from someone you don't fully trust.
Monitoring apps (spyware) โ how to detect them +
Spyware apps (sometimes called "stalkerware") are installed secretly on your phone to record your calls, read your messages, see your photos, and track your location โ all without your knowledge.
Warning signs that spyware may be on your phone:
- Your battery drains much faster than usual
- Your phone feels warm even when not in use
- Your mobile data is being used even when you're not actively using the phone
- The phone is slow or apps crash frequently for no reason
- Someone seems to know details of conversations you had privately on your phone
How to check (Android):
- Go to Settings โ Apps. Look for unfamiliar apps you didn't install. Spyware often has innocent-sounding names.
- Go to Settings โ Battery โ Battery usage. Look for apps consuming a lot of battery that you don't recognise.
- Check Settings โ Security โ Device Admin Apps. Spyware often gives itself admin privileges to prevent removal.
- Install Malwarebytes (free) and run a scan.
Online dating safety โ catfish, red flags, meeting safely +
Meeting people online โ through matrimony sites, Instagram, dating apps, or mutual groups โ can be safe when you know what to watch for.
Signs someone may be a catfish or scammer:
- Their profile photo returns results on Google reverse image search from other names or websites โ a strong sign the photo is stolen
- They can't video call โ there's always an excuse (camera broken, not private, travelling)
- They escalate emotionally very fast โ "I've never felt this way" within days of talking
- They ask you to move off the platform quickly (to WhatsApp, Telegram) where conversations are harder to report
- Eventually ask for money โ medical emergency, visa fee, stuck at customs, business investment
- Their stories about their life have inconsistencies or vague details when you probe
Red flags before sharing photos:
- You haven't video-called with them
- You've known them less than a few weeks
- They've pressured you or made you feel guilty for not sharing
- They've asked for photos in private settings or explicitly
Meeting someone from online safely:
- Meet in a public place for the first several meetings โ not your home or theirs
- Tell a trusted friend: who you're meeting, where, when, and when to expect you back
- Share your live location with a trusted friend during the meeting (WhatsApp Live Location)
- Have a code word with a friend: if you send it, they call you with a plausible excuse to leave
- Drive or take your own transport โ don't depend on them for the return journey
Consent and digital boundaries in relationships +
Consent applies in digital spaces exactly as it does in physical ones. Here's what that looks like in practice.
Digital consent means:
- No one has the right to share, forward, or screenshot your private messages or photos without your permission โ regardless of your relationship with them
- A partner asking to "check your phone" or demanding your passwords is a violation of digital consent, not a normal relationship request
- Intimate photos shared within a relationship remain under your control โ they cannot be shared, threatened with, or used as leverage without breaking consent and the law
- You can withdraw consent at any time โ "I've shared this before" does not mean they can share it or keep it indefinitely
Setting and communicating digital boundaries:
- It's okay to say: "I don't share my passwords with anyone, including you โ that's a personal boundary I keep."
- It's okay to say: "I'm not comfortable sharing intimate photos. That's not something I do."
- It's okay to say: "Please don't screenshot or forward our conversations."
- A partner who respects you will accept these boundaries. One who reacts with anger, guilt-tripping, or pressure is a red flag.
Safe sexting practices โ if you choose to share intimate content +
This guide is non-judgmental. If you choose to share intimate content, these practices reduce risk significantly.
Before you share anything:
- Exclude your face. This is the single most protective step. Content without a face is significantly harder to use for identity-based harassment or extortion.
- Remove identifying features. Tattoos, birthmarks, distinctive jewellery, or recognisable backgrounds can identify you. Be aware of what's in frame.
- Strip photo metadata before sending (see Photo Metadata guide). Use an app like VerEXIF or send through a platform that compresses images (which strips metadata).
- Use a platform that can delete from both ends โ WhatsApp "View once" or Signal with disappearing messages. Understand that screen recording can still capture these.
Honest risk assessment:
- Once content is sent digitally, you cannot technically guarantee it stays private โ this is true regardless of what platform you use
- The risk is primarily from the person receiving it, not from the platform (platforms are unlikely to see your private messages; the recipient is the risk)
- Trust and relationship quality are the most important factors โ which is impossible to fully guarantee with anyone