Technology Safety for Survivors
How to secure phones, apps, and devices.
Device Security Basics
Why Device Security Matters in Unsafe Relationships
If someone is harming or controlling you, they may also try to control your devices. Securing your phone, tablet, or computer can help protect your messages, location, and plans.
You may want to think about what level of privacy is realistic and safe for you right now. For some people, completely locking down a device might increase conflict. Small, low‑visibility changes can still make a difference.
1. Lock Screen and Basic Access
Your lock screen is the first barrier between your information and someone else.
Choose a Strong Lock
- Use a PIN, password, or pattern that the other person cannot easily guess (avoid birthdays, anniversaries, or simple sequences like 1234).
- If you use a pattern, avoid simple shapes and disable “pattern visible” lines if possible.
- On some devices, you can have different fingerprints or face unlock profiles; you may want to remove any profiles you don’t fully control.
Adjust Lock Timing
- Set your screen to lock automatically after a short time when not in use.
- Turn off “lock screen notifications preview” if you do not want message content to appear while your phone is locked.
Shared or Monitored Devices
- If the other person insists on knowing your passcode, changing it suddenly might raise questions.
- You might instead limit what is visible on that device and use another device or account for more private communication.
2. Accounts, Passwords, and Two‑Step Verification
Many devices sync information through accounts (such as Apple ID, Google, Microsoft, or email accounts). Whoever controls the main account may see a lot.
Review Which Accounts Are Signed In
- Check the “Accounts,” “Users,” or “Passwords & Accounts” section in your settings.
- Note which email, cloud, or manufacturer accounts are connected (for example, iCloud, Google, Samsung, Microsoft).
- Consider whether any of these accounts were created by or shared with the abusive person.
Strengthen Key Passwords
- Change passwords from a device and network you believe are safer (for example, not on a shared home Wi‑Fi, if that concerns you).
- Create longer passwords using a mix of words, numbers, and symbols that are not tied to your personal life.
- Avoid letting browsers “auto‑fill” passwords on shared devices.
Two‑Step or Multi‑Factor Authentication
- Two‑step login can protect your accounts even if someone knows your password.
- Be cautious: if codes go to a phone or email the other person can see, they may receive alerts when you log in or change settings.
- When possible, direct authentication codes to a method only you can access, like a private email or an authenticator app on a device they do not handle.
3. Updates and Basic Security Settings
Keeping your device up to date reduces known security weaknesses.
- Turn on automatic system updates when possible.
- Install updates when your device suggests them, if it feels safe to do so.
- Use built‑in security tools like “Find My Device” or “Find My iPhone” only if you are sure the account is under your control and not shared.
4. Apps and Permissions
Apps can collect location, microphone, camera, and contact information. Reviewing what each app can access may reduce monitoring risks.
Review Installed Apps
- Go through your list of installed apps slowly. Look for apps you do not recognize or do not remember installing.
- Search the app’s name online with words like “spy,” “monitor,” or “tracker” to see if others report it as surveillance software.
- If an app seems suspicious, you may choose to remove it, but be aware that uninstalling it might be noticed.
Check App Permissions
- Open your device settings and find “Permissions,” “Privacy,” or “App access.”
- Review which apps can use location, microphone, camera, contacts, SMS, or call logs.
- Turn off permissions that do not seem necessary for that app’s basic function.
Downloads and Links
- Only install apps from official app stores, if possible.
- Be cautious about opening links or attachments sent by someone who may be trying to monitor you.
- Avoid using “jailbroken” or “rooted” devices unless you clearly understand the security risks.
5. Location and Sharing Settings
Location‑sharing can be useful but is often misused in abusive situations.
Device Location Services
- In settings, you can usually turn location on or off globally and per app.
- Consider limiting location access to essential apps such as maps or emergency services.
- Check for options that allow apps to use location “only while using the app” rather than “always.”
Location‑Sharing Features
- Review whether you are sharing your real‑time location through built‑in features (for example, “Share My Location,” “Family” groups, or map apps).
- Check social media apps for location tags and “check‑in” features.
- Turning off sharing may be noticed; sometimes people choose instead to share from a secondary account or shift to less precise settings.
6. Communication Privacy (Calls, Texts, Email, Social)
People who cause harm may try to read messages, log into accounts, or pretend to be you.
Texts and Messaging Apps
- Some messaging apps offer end‑to‑end encryption and disappearing messages. These can reduce the chance of someone reading past conversations on your device.
- Consider whether using a new or different messaging app could draw attention.
- Turn off message previews on the lock screen if you’re concerned someone might see incoming texts.
Email Accounts
- Check where your email is signed in (phone, tablet, laptop, shared work computer).
- Log out from devices that others use, if safe.
- If you create a new private email, avoid syncing it automatically to shared devices.
Social Media
- Review your privacy settings so posts are visible only to people you choose.
- Check which devices and locations are logged into your accounts and sign out of anything you do not recognize.
- Consider who can see your “online” or “last seen” status and whether you want that visible.
7. Signs Your Device May Be Monitored
Some forms of monitoring are hard to detect. However, certain patterns can raise concern.
- The other person seems to know details you have only shared digitally or through one device.
- Your battery drains very quickly or your device feels unusually hot, even when you are not using it much.
- You notice unfamiliar apps, settings you did not change, or frequent requests to install “security” tools you did not ask for.
- They insist on “helping” you set up the phone, demand your passwords, or say they must “check” your device regularly.
8. Safer Use of Shared or “Compromised” Devices
Sometimes it is not realistic to fully secure a device. You can still make thoughtful choices about what you use it for.
- Treat a device as “shared” if the other person knows the passcode, can unlock it with their fingerprint or face, or has access to the main account.
- Avoid using that device for sensitive searches, notes, or communication if you believe it is being monitored.
- Keep more sensitive conversations on another device or account, when safe to do so.
- Consider what information you store on the device (for example, photos, plans, contacts under real names).
You can explore additional support options, including digital safety resources, through information listed at DV.Support.
9. Planning Next Steps
You are the best judge of what is possible and safe in your situation. When thinking about device security, you might reflect on:
- What the other person already has access to (passwords, physical devices, shared accounts).
- Which changes they are likely to notice.
- What information is most important for you to keep private right now.
- Whether you have access to another device that the other person does not handle.
Making even one small change—such as limiting lock‑screen previews or reviewing app permissions—can be a meaningful step toward more privacy.