A note before you read: If any of the situations on this page describe your life, please know that it is not your fault, and help is available. See our Your Rights page and the Takedown Resource Kit for crisis support.
๐Ÿšฉ Digital coercive control โ€” signs and examples +

Digital coercive control is when someone uses technology to monitor, control, intimidate, or isolate you. It is a form of domestic abuse โ€” even if there is no physical violence.

Common signs:

  • They demand to know your phone password or check your messages regularly
  • They track your location through apps like Google Maps or WhatsApp Live Location โ€” and get angry if you turn it off
  • They insist on having access to your email, social media, or bank accounts
  • They control which apps you can use or who you can follow / talk to online
  • They send threatening messages, then delete them โ€” making it hard to prove
  • They post private photos or information about you to embarrass or control you
  • They impersonate you online (fake profiles) to monitor people who contact "you"
๐Ÿšจ Remember: A partner who truly loves you does not need access to all your messages. Privacy is a right in every relationship.
โœ… Document everything: Screenshot threatening messages before they are deleted. Note dates and times. You may need this evidence later. Store screenshots in a cloud account the other person does not have access to.
๐Ÿ“ก AirTag and Bluetooth tracker stalking +

Apple AirTags and similar small Bluetooth trackers (like Tile, Samsung SmartTag) are designed to find lost keys or bags. But they are increasingly used by stalkers to secretly track someone's movements.

How stalking via AirTag works:

  • The tracker is secretly placed in your bag, car, jacket pocket, or attached under a vehicle
  • The stalker's phone receives a continuous GPS location of wherever the tracker goes โ€” meaning wherever you go
  • The tracker is tiny (about the size of a โ‚น10 coin) and can hide anywhere

How to detect an AirTag:

  • iPhone users: Your phone will automatically notify you if an unknown AirTag has been travelling with you. Take this alert seriously.
  • Android users: Download the Tracker Detect app by Apple (free on Google Play Store). Run a manual scan of your bag, car, and belongings.
  • Physically check your bag interior pockets, car wheel arches, under seats, and jacket pockets โ€” especially after visits from someone you don't fully trust.
โœ… If you find a tracker: Do not throw it away immediately โ€” it is evidence. Take it to your nearest police station and show them. Place it in someone else's bag (e.g., a public bus) temporarily to confuse the tracker's signal while you get help.
๐Ÿ”— Risks of shared accounts +

Sharing an account with a partner โ€” whether it's Netflix, Google, Gmail, or a phone plan โ€” can be convenient. But it also creates serious risks.

What shared accounts can reveal:

  • Shared Google/iCloud account: All your photos, location history, browsing history, and Gmail are visible to the other person. This is extremely invasive.
  • Family phone plan: The account holder may be able to see call logs, SMS records, and even your real-time location through the carrier's app.
  • Netflix / streaming: Lower risk โ€” but watch history may reveal what you've been watching privately.
  • Banking apps: A shared bank account means all transactions are visible to both parties.

What to do:

  • Create your own private Gmail/iCloud account that only you know and control
  • Keep financial accounts separate where possible
  • Review which accounts you share and decide if there are privacy risks you haven't considered
โš ๏ธ Be careful when separating accounts in a volatile relationship. Making sudden changes (e.g., removing someone from a family plan) may escalate conflict. Plan carefully and consider reaching out to a support helpline first โ€” see Your Rights.
๐Ÿ•ต๏ธ Monitoring apps (spyware) โ€” how to detect them +

Spyware apps (sometimes called "stalkerware") are installed secretly on your phone to record your calls, read your messages, see your photos, and track your location โ€” all without your knowledge.

Warning signs that spyware may be on your phone:

  • Your battery drains much faster than usual
  • Your phone feels warm even when not in use
  • Your mobile data is being used even when you're not actively using the phone
  • The phone is slow or apps crash frequently for no reason
  • Someone seems to know details of conversations you had privately on your phone

How to check (Android):

  1. Go to Settings โ†’ Apps. Look for unfamiliar apps you didn't install. Spyware often has innocent-sounding names.
  2. Go to Settings โ†’ Battery โ†’ Battery usage. Look for apps consuming a lot of battery that you don't recognise.
  3. Check Settings โ†’ Security โ†’ Device Admin Apps. Spyware often gives itself admin privileges to prevent removal.
  4. Install Malwarebytes (free) and run a scan.
๐Ÿšจ If you find spyware: Do NOT delete it immediately if you are in a dangerous situation โ€” the person monitoring you may be alerted. First, contact a support helpline (Women's Helpline: 181) and make a safety plan. The app may be needed as evidence.
๐Ÿ’– Online dating safety โ€” catfish, red flags, meeting safely +

Meeting people online โ€” through matrimony sites, Instagram, dating apps, or mutual groups โ€” can be safe when you know what to watch for.

Signs someone may be a catfish or scammer:

  • Their profile photo returns results on Google reverse image search from other names or websites โ€” a strong sign the photo is stolen
  • They can't video call โ€” there's always an excuse (camera broken, not private, travelling)
  • They escalate emotionally very fast โ€” "I've never felt this way" within days of talking
  • They ask you to move off the platform quickly (to WhatsApp, Telegram) where conversations are harder to report
  • Eventually ask for money โ€” medical emergency, visa fee, stuck at customs, business investment
  • Their stories about their life have inconsistencies or vague details when you probe

Red flags before sharing photos:

  • You haven't video-called with them
  • You've known them less than a few weeks
  • They've pressured you or made you feel guilty for not sharing
  • They've asked for photos in private settings or explicitly

Meeting someone from online safely:

  • Meet in a public place for the first several meetings โ€” not your home or theirs
  • Tell a trusted friend: who you're meeting, where, when, and when to expect you back
  • Share your live location with a trusted friend during the meeting (WhatsApp Live Location)
  • Have a code word with a friend: if you send it, they call you with a plausible excuse to leave
  • Drive or take your own transport โ€” don't depend on them for the return journey
โœ… Verify identity early: A video call is the minimum verification. Genuine people are usually happy to video call. Anyone who consistently avoids it should raise immediate concern. See our reverse image search guide.
๐Ÿ” Safe sexting practices โ€” if you choose to share intimate content +

This guide is non-judgmental. If you choose to share intimate content, these practices reduce risk significantly.

Before you share anything:

  • Exclude your face. This is the single most protective step. Content without a face is significantly harder to use for identity-based harassment or extortion.
  • Remove identifying features. Tattoos, birthmarks, distinctive jewellery, or recognisable backgrounds can identify you. Be aware of what's in frame.
  • Strip photo metadata before sending (see Photo Metadata guide). Use an app like VerEXIF or send through a platform that compresses images (which strips metadata).
  • Use a platform that can delete from both ends โ€” WhatsApp "View once" or Signal with disappearing messages. Understand that screen recording can still capture these.

Honest risk assessment:

  • Once content is sent digitally, you cannot technically guarantee it stays private โ€” this is true regardless of what platform you use
  • The risk is primarily from the person receiving it, not from the platform (platforms are unlikely to see your private messages; the recipient is the risk)
  • Trust and relationship quality are the most important factors โ€” which is impossible to fully guarantee with anyone
โœ… If content is ever shared without your consent: It is a crime under IT Act 66E and 67A. You are not at fault. See our Emergency Help page for immediate steps.