3 Simple Steps to Increase Your Privacy and Increase Your Security (without going crazy)

A More Practical Approach to Every Day Privacy and Security

The Tactical Victim
10 min readJul 5, 2024
Photo by FlyD on Unsplash

-The Tactical Victim-

It’s a Mindset, a New Way of Life 🔒

For those of you who are not a current victim of abuse (and hopefully never will be), my blog will seem a bit extreme and unnecessary to you.

And, it likely is.

For those of you who want to:

  • Increase Your Overall Privacy
  • Decrease your chances of becoming a victim

there are some basic-intermediate steps you take.

In addition, in case of a worst case scenario,
These steps will: help maintain your stability and security if

your environment or those in it,
are no longer stable or safe.

-The Most Basic Level-

Photo by Mika Baumeister on Unsplash

At the most Basic Level;

1. A) PIN Your Electronic Devices

Whether it’s your phone, tablet, smart watch or anything else: Use the PIN lock feature.

💡 Lock screen/Screen Time out features:

Photo by Jamie Street on Unsplash

is an evolution of the old login screen and serves a similar purpose: It stops a person from using your device unless they know the password or passcode”

Also, make sure to set a short timer, for your device screen to lock up.

Here’s a scary example, however, it can be as simple as preventing your bank from being drained if the device is stolen.

Stolen Labtop and phone Stories

Provided it’s not your birthday digits,
it’s the most secure way to keep people out of your devices.

Photo by Ana Achim on Unsplash

Why not the:

  • Finger Print or Face login options?

-they (a potential abuser/snoopy partner),
may use this while your sleeping to access your devices.

  • How about Swipe?
    -
    this leaves a grease mark, making it easier to swipe into your device.

At the most basic level,

Be Aware of:

Photo by Vitaly Gariev on Unsplash
  • i) Do you both use the same laptop, tablet?

Your browser will save the search history, anything you type in.

  • ii) Does your/their: (consider the above question)

-Email
-Bank Account
-Social Media

automatically save the password and login (so you don’t have to type it in each time?)

Photo by Cedrik Wesche on Unsplash

Impact:
That means they can see anything on those accounts too,
as they can login as well then (even if you haven’t told them the password/login)

At the most basic level, purchase a:

1. B) Encrypted Flash drive

Photo by Lc on Unsplash

You can get a pretty cheap encrypted flash drive from a office store.

USB Daily and Normal Uses:
If you travel the states, are concerned about losing your USB,
this is a very practical solution for you anyway.

Photo by Radu Prodan on Unsplash

How Does a encrypted USB usually work?

They require a PIN code, before it will open up files on your computer.

Again, don’t use your b-day.

Explanations

Photo by Campaign Creators on Unsplash

Potential Explanation (for concerned partners-potential victims):
-
Maybe it’s for work, a friends?

-Or maybe you just keep it at your work desk,
and no one knows about it.

Encrypted USB Purpose/Storage:
Great for storing copies of anything important:

-Numbers
-Work information/projects
-Legal-Financial-Medical documents
-ID’s
-Passwords

and so on.

Tip: there’s some very fancy and expensive ones.
I don’t think they are necessary.

At the most basic level;

1. C) Get a PO Box

Alot of people have them anyway.

Photo by Tim Evans on Unsplash

This protects your address from getting extra mail,
and makes it a bit more difficult to find.

In the unlikely event some creepy employee/boss,
or social media fan stalks you,
it is part of the solution,
to preventing them from knowing where you live.

Worst Case Scenarios

If your spouse/(or whoever), does lose their shit,
you may be able to request the PO Box location to forward your mail to another (far away) mail drop off/address.

Photo by Jonathan Kemper on Unsplash

Who has Access to Your Mail?
Also or ideally, take them (the other untrustworthy person) off the permission list of having any access to the P.O. Box.

-Intermediate Level Privacy-

(If you’re potentially mildly concerned about another person in your life,
take the above steps and the below steps too.)

Photo by Icons8 Team on Unsplash

These steps will allow you to keep information separate from the other person.

They will make it easier for you to leave as well,
if you realize you need to.

Steps, Separation and Structure

  • Below are some more simple steps, separations and structures you can set up in your life.
  • They will decrease the damage someone else can have on your: life, finances and safety.
Photo by pine watt on Unsplash
  1. Tip: there are some questions you will need to ask each of the companies (for the supplements* and necessities*) to make sure you understand:

Such as:

-How they work (ie. the phone plan privacy features)

-Where/How information gets sent

*You will see below

→Note: the knitty gritty

I’m just teaching the overall structure in this article, and I’m likely passing up some of the knitty/gritty per the questions you may need to ask each company.

*Strong Supplements/Necessities:

Having a separate email and an allowed (for a 2nd bank account) seperate form of address, will likely be necessary too.

Photo by Hansjörg Keller on Unsplash

There’s easy ways to do this:

1. Email: (necessity)

-Mail.com (set up an email here with with a different password than he/she knows)

2. Second Address (necessity)

Photo by Mahdis Mousavi on Unsplash

-Virtual Mailing Address (these may or may not work with some banks, click all links!)

Generally, business bank accounts may be more lenient, and or virtual bank accounts.

  • Alternative Qualifying Physical Mailing Address: A Shelter, highly trusted friends house
Photo by Jonathan Kemper on Unsplash

Tip:
ask the bank what else can count as an official address, and what is needed if you choose to have a shelter as one.

3. Storage

(a supplement for those not in danger, but incredibly helpful if things go real south real fast)

Photo by Florencia Viadana on Unsplash

-A Public Storage (ideally only known to you)

Keep anything you want to keep private in here, as well as some copies of important documents-information.

4. That Encrypted Flash Drive(s)!
(You can keep this at work, or in the storage)

-How to Use these 3 New Services-

Set up:
Use these services in conjunction with each other:
-To communicate (possibly with others)
-Store (proof, documents)
-Email
-Make/Store copies with

and more securely login to each-other and only with each-other
(never connect them to your old accounts)

I’ll show you below how to do this..it’s not too tough!

⚠️ WARNING: if you use the same:

-Card

-Bank account

-Email you both share, to set up any of this,

-Phone number/text service

they will be notified of these new accounts/storage units.

Photo by Brett Jordan on Unsplash

⚠️Also: if you use the same address, they will receive the paper copies and notifications.

That’s why a Virtual Address, shelter or trusted friends house,
is important.

2. Create Separate and Private Bank Accounts

Many couples and others your close with, may share bank accounts.

Photo by Ethan Wilkinson on Unsplash

Sometimes everyone will share the same email/number for this account too (some will have multi-factor authentication set up to receive the code when you login).

Other times: one person has more or less access and control.

  • I strongly suggest you both have equal control over any account you both set up.

The Risk of Sharing One Bank Account:

To use a dating example:
if your girlfriend and you share the account and the money in it,
they can drain your money,
and block use of your account much easier,
if they have more power on the account.

The Simple Solution:

Have a separate bank account, whether brick and motor or electronic (like Chime).

Photo by PiggyBank on Unsplash

Accessing the Account:
Make sure how you access that (when logging in), is separate too,
as well as how you receive login and updated information (electronic or mail).

i. A Separate Email and phone number to log in with

ii. And a separate device to log in with as well that is not used by the other person

Photo by Kees Streefkerk on Unsplash

How to do this:

Use your library computer, work computer or a separate smart phone/tablet your partner doesn’t have access too.

New Password:
A different login password(s), and email ensures the other person can’t access it, or if they find it, can’t guess the password.

Make sure you have a different PIN for the devices too.

Practical Financial Steps:

Start putting some money aside in this account.

Photo by Alexander Mils on Unsplash

Potential Explanation:
Maybe it’s your “emergency fund” in case your job falls though.

Or, even better, you just don’t tell anyone about it.

Like an emergency job fund, have 6-12 months worth of savings stored up.

Worst Case Scenario

If your bf/wife, shows signs that concern you, take (only) the amount of money in the shared account that’s yours, and transfer it over to the new one.

More Private and ways to transfer money out of your shared account:

A) Helpful Apps:

Photo by Marques Thomas on Unsplash

Peer to Peer transfer Apps (like a Business* Paypal), may help you do this with more flexibility and ease.

*business accounts (in general with these apps) can be set up more anonymously.

-You can use any new email and any business name, as your account.

-Only you will see your name as the real owner, provided the email/business name doesn’t have your personal information in it.

Impact:

This design will also will help you hide the last account you put it in (so they can’t see the new account number, ownership, or name of the bank).

“The people who receive money from you don’t have access to any personal information, including your bank account information or your credit card information”

-Addition Financial

-Safety from Thieves too

You also don’t have to worry about carrying the money in cash and getting robbed.

More helpful Tools:

Photo by Ron McClenny on Unsplash

PayPal has a debit card, that allows you to take money out of an atm, for after your money arrives in the account.

Find at: You can often find them at Walmarts, or CVS’s.

3. Phone and Internet Accounts

Phone and internet companies will tell you all your level of access and control options (however, make sure to ask), when you set up your account.

Photo by Norbert Kundrak on Unsplash
  • Remember, the Master Account Holder/ “Parent Account”, has all the power.
  • The manager, has the next level of power/control
  • and those under that-the least if any.

Personally, make sure you both have equal power, and be aware of what the other one can see or not see (phone calls, locations, internet searches).

Worst Case Scenarios

If the master owner/manager becomes obsessive,
they can use tools that most companies offer,
that would allow them to monitor your calls, location and more.

I’d keep it equal, and let’s hope it never gets to that point.

-Advanced Level/Border Line Escape-

Get a Prepaid phone and calling card (minutes and data) and put it in your public storage

Photo by freestocks on Unsplash

(Remember, don’t buy it with a card/account you both share)

⚠️ if you feel more than the steps above is necessary:
it may be time to go to my escape plan post (Escape Now)

🛑 If your on a device they have access to, stop using it now,

and go to the:

-library,

-you/your friends work

or even an

-apple/computer store,

and use the computers there.

Photo by Jason Leung on Unsplash

⚠️ Gut Feeling:

  1. If there’s no: Behavioral, verbal, electronic..or any other obvious sign(s) you're in danger…

but your gut is telling you to Get the F*ck out,

-then Get Out-

Follow me and or Subscribe to My Email List, if you want to stay up to date for my latest Security, Psychological and Tactical tips..

Thank you all for your support.

-The Tactical Victim-

It’s a Mindset, a New Way of Life 🔒

--

--

The Tactical Victim

Male Domestic Violence, Sexual Assault and Stalking Survivor 🔒 Here to help you Assess the Risk, Escape-Survive and Remain Unfound. Cleared Professional