Digital Minimalism for Survivors
Reducing digital footprints to increase safety.
Minimizing Apps and Limiting Shared Information
Why Minimizing Apps and Information Can Matter
If you are dealing with controlling or abusive behavior, technology can be used to monitor, track, or pressure you. Reducing the number of apps you use and limiting what information they collect may lower some risks and give you more privacy.
You can choose which of these ideas feel realistic and safe in your situation. It may help to make changes slowly so they are less noticeable.
Step 1: Take Stock of Your Devices
Before changing anything, you may want to quietly review what you are using now.
- List your devices – phone, tablet, laptop, smartwatch, smart TV, gaming console, home assistants, car systems.
- Note who set them up – you, a partner, family member, workplace IT, or a store employee.
- Consider who knows passwords – partners, children, friends, coworkers.
- Look for shared accounts – Apple ID, Google account, cloud storage, streaming services, banking, mobile carrier logins.
Step 2: Minimize Apps You Do Not Need
Reducing the number of apps on your phone or tablet can limit how much information is collected and what others can see.
Apps You May Want to Review
- Location and map apps – check for apps that constantly track location or share it with others.
- Social media – Facebook, Instagram, Snapchat, TikTok, X, and others that reveal where you are, who you talk to, or your activities.
- Messaging apps – WhatsApp, Messenger, Telegram, Signal, or others, especially if multiple people can access them.
- “Family safety” or tracking apps – apps marketed for child or family tracking that may also be used for monitoring adults.
- Shared finance or shopping apps – bank apps, payment apps, ride-share, delivery, or shopping apps that show your purchases or movements.
- Unknown or unused apps – apps you do not remember installing or no longer use.
Safer Ways to Remove or Hide Apps
Only make changes that feel safe and realistic. You may prefer gradual changes so they are less obvious.
- Start with unused apps that clearly seem unnecessary (for example, games or duplicates).
- “Offload” or disable apps instead of fully deleting them if your device allows it, so they can be restored later.
- Turn off background permissions (location, microphone, camera, contacts) for apps you keep but do not fully trust.
- Reduce notifications so private messages do not pop up on the lock screen where others can read them.
- Use web browsers instead of apps for some services, which may collect less ongoing data.
Step 3: Limit What Information Apps Can Access
Most devices let you control what each app is allowed to access.
Permissions to Review
- Location – consider changing “Always” access to “While using the app” or turning it off for apps that do not truly need it.
- Contacts – decide whether a social or marketing app really needs your address book.
- Microphone and camera – you may want to deny access except when you actively use them (video calls, photos).
- Photos and files – limit apps to only certain folders, where possible.
- Calendars and reminders – consider whether apps need to see your schedule.
- Health and fitness data – check what smartwatches or health apps share with cloud accounts or other people.
On many devices you can also:
- Turn off ad tracking or personalized ads.
- Limit background app refresh so apps are not constantly updating when you are not using them.
- Review app “privacy dashboards” that show which apps recently used location, microphone, or camera.
Step 4: Think About Shared Accounts and Syncing
Cloud services can quietly copy a lot of information across devices, including ones you do not physically have.
Common Syncing Risks
- Photos and videos – may upload to shared cloud accounts where others can see them.
- Messages and call logs – some services sync texts, iMessages, and calls across phones, tablets, and computers.
- Browser history and passwords – may sync to another device signed into the same account.
- Location history – Google, Apple, and other services may keep long-term records of your movements.
Options You May Consider
- Check which devices are signed in to your Apple ID, Google account, or similar services, and review any unfamiliar devices.
- Turn off specific sync features (for example, messages or photos) rather than the whole account if a full change would be noticed.
- Create a separate account for some apps on a different device (for example, a private email address) if safe to do so.
- Use “guest mode” or private browsing where available, so some activities are not saved to your main account.
Step 5: Be Careful With Location and “Safety” Apps
Some apps marketed for safety or family connection can also be tools for surveillance if misused.
Location Sharing
- Review who can see your location through built-in features (such as “Find My” or Google location sharing).
- Check ride-share, delivery, or dating apps for past addresses and locations saved in your history.
- Consider using more general location labels (for example, only selecting a street or landmark) when that feels safer.
“Monitoring” and “Parental Control” Apps
These apps can, in some situations, be installed on your device without your full understanding and may track your use, messages, or location.
- Check your installed apps list for anything labeled “monitor,” “tracker,” “control,” “spy,” or “family safety.”
- Look for unusual battery drain or data use that might signal hidden software.
- Consider having a trusted professional (for example, a reputable computer or phone technician) review your device if that feels safe.
Step 6: Limiting What You Share Online
Limiting the information you post or reveal can sometimes reduce how much control or pressure someone can apply.
Social Media and Online Profiles
- Check privacy settings so posts are not automatically public.
- Avoid real-time location posts if that might put you at risk.
- Review your friends or followers list and remove people you do not know or trust.
- Be cautious with photos that show your home, routine, or identifiable landmarks.
- Limit personal details such as your workplace, school, children’s schools, or daily schedule.
Messaging and Email
- Use neutral language in messages that might be read by others who have access to your devices.
- Avoid storing sensitive conversations in apps you know are regularly checked by the other person.
- Consider a separate email account for important documents or communication, if it is safe to create and maintain.
Step 7: Balancing Safety With Everyday Life
Minimizing apps and limiting shared information needs to fit with your daily responsibilities and risks. For many people, completely disconnecting is not realistic or even helpful.
- Identify what you truly need day to day: banking, transport, childcare communication, work tools.
- Protect key functions first, such as secure access to money, health information, or children’s schools.
- Use small, gradual changes rather than sudden major shifts, especially if the other person monitors your devices.
- Document concerning behavior (such as threats or tracking) if it feels safe, in case you later want legal or advocacy support.
You can explore additional information about technology safety and support options, including advocacy organizations, through resources listed at DV.Support.
When You Might Want Outside Support
It can be helpful to talk with someone who understands both abuse dynamics and technology.
- Local domestic abuse programs may offer safety planning that includes phone and online privacy.
- Legal aid or advocacy organizations in your area might explain how technology evidence can be used in protection orders or other processes.
- Some digital rights or privacy groups publish guides on secure communication and device settings.