Generic privacy guides are written for people worried about advertisers. This one is written for someone with a specific threat: a person who knows your name, your patterns, and has already demonstrated he will use technology to find you.
This guide closes the doors he could use to find you. Systematically. One by one.
What's Inside
•Data brokers and people-search sites - how to opt out of the major aggregators including LexisNexis, Spokeo, WhitePages, BeenVerified, and more, with a table showing opt-out method and wait time for each
•Your phone - separating your real number from your public-facing identity, auditing location services and app permissions, reviewing iCloud and Google family sharing
•Your accounts - setting up a clean private email, password manager, two-factor authentication, and revoking third-party app access
•Your home network - securing your router admin panel, changing your Wi-Fi password, guest networks for untrusted devices, auditing smart home access
•VPNs - what they actually protect against, what they don't, and which providers are worth trusting in your specific situation
•Physical-digital overlap - your vehicle's connected services, your workplace, your children's school, and protecting your new address from public records
•A checklist at the end of every section so you know exactly where you are and what's done
Who This Is For
Survivors of technology-facilitated abuse, coercive control, or stalking who need to systematically reduce every digital surface an abusive ex could use to find them, track them, or access their information.
Important
This guide addresses prevention and hardening. If your devices may already be compromised - if stalkerware may be installed or your accounts may already be accessed - start with the Digital Safety Audit (free at safety.apomarchives.com) and the platform log download guide before working through this one.
Format
PDF, delivered immediately. Each section includes a printable checklist. No technical background required.