Generic privacy guides are written for people worried about advertisers. This one is written for someone with a specific threat: a person who knows your name, your patterns, and has already demonstrated he will use technology to find you.

This guide closes the doors he could use to find you. Systematically. One by one.


What's Inside

Data brokers and people-search sites - how to opt out of the major aggregators including LexisNexis, Spokeo, WhitePages, BeenVerified, and more, with a table showing opt-out method and wait time for each

Your phone - separating your real number from your public-facing identity, auditing location services and app permissions, reviewing iCloud and Google family sharing

Your accounts - setting up a clean private email, password manager, two-factor authentication, and revoking third-party app access

Your home network - securing your router admin panel, changing your Wi-Fi password, guest networks for untrusted devices, auditing smart home access

VPNs - what they actually protect against, what they don't, and which providers are worth trusting in your specific situation

Physical-digital overlap - your vehicle's connected services, your workplace, your children's school, and protecting your new address from public records

•A checklist at the end of every section so you know exactly where you are and what's done


Who This Is For

Survivors of technology-facilitated abuse, coercive control, or stalking who need to systematically reduce every digital surface an abusive ex could use to find them, track them, or access their information.


Important

This guide addresses prevention and hardening. If your devices may already be compromised - if stalkerware may be installed or your accounts may already be accessed - start with the Digital Safety Audit (free at safety.apomarchives.com) and the platform log download guide before working through this one.


Format

PDF, delivered immediately. Each section includes a printable checklist. No technical background required.