3 Simple Steps to Increase Your Privacy and Increase Your Security (without going crazy)
A More Practical Approach to Every Day Privacy and Security
-The Tactical Victim-
It’s a Mindset, a New Way of Life 🔒
For those of you who are not a current victim of abuse (and hopefully never will be), my blog will seem a bit extreme and unnecessary to you.
And, it likely is.
For those of you who want to:
- Increase Your Overall Privacy
- Decrease your chances of becoming a victim
there are some basic-intermediate steps you take.
In addition, in case of a worst case scenario,
These steps will: help maintain your stability and security if
→ your environment or those in it,
are no longer stable or safe.
-The Most Basic Level-
At the most Basic Level;
1. A) PIN Your Electronic Devices
Whether it’s your phone, tablet, smart watch or anything else: Use the PIN lock feature.
💡 Lock screen/Screen Time out features:
“is an evolution of the old login screen and serves a similar purpose: It stops a person from using your device unless they know the password or passcode”
Also, make sure to set a short timer, for your device screen to lock up.
Here’s a scary example, however, it can be as simple as preventing your bank from being drained if the device is stolen.
Provided it’s not your birthday digits,
it’s the most secure way to keep people out of your devices.
Why not the:
- Finger Print or Face login options?
-they (a potential abuser/snoopy partner),
may use this while your sleeping to access your devices.
- How about Swipe?
-this leaves a grease mark, making it easier to swipe into your device.
At the most basic level,
Be Aware of:
- i) Do you both use the same laptop, tablet?
Your browser will save the search history, anything you type in.
- ii) Does your/their: (consider the above question)
-Email
-Bank Account
-Social Media
automatically save the password and login (so you don’t have to type it in each time?)
Impact:
That means they can see anything on those accounts too,
as they can login as well then (even if you haven’t told them the password/login)
At the most basic level, purchase a:
1. B) Encrypted Flash drive
You can get a pretty cheap encrypted flash drive from a office store.
USB Daily and Normal Uses:
If you travel the states, are concerned about losing your USB,
this is a very practical solution for you anyway.
How Does a encrypted USB usually work?
They require a PIN code, before it will open up files on your computer.
Again, don’t use your b-day.
Explanations
Potential Explanation (for concerned partners-potential victims):
-Maybe it’s for work, a friends?
-Or maybe you just keep it at your work desk,
and no one knows about it.
Encrypted USB Purpose/Storage:
Great for storing copies of anything important:
-Numbers
-Work information/projects
-Legal-Financial-Medical documents
-ID’s
-Passwords
and so on.
Tip: there’s some very fancy and expensive ones.
I don’t think they are necessary.
At the most basic level;
1. C) Get a PO Box
Alot of people have them anyway.
This protects your address from getting extra mail,
and makes it a bit more difficult to find.
In the unlikely event some creepy employee/boss,
or social media fan stalks you,
it is part of the solution,
to preventing them from knowing where you live.
Worst Case Scenarios
If your spouse/(or whoever), does lose their shit,
you may be able to request the PO Box location to forward your mail to another (far away) mail drop off/address.
Who has Access to Your Mail?
Also or ideally, take them (the other untrustworthy person) off the permission list of having any access to the P.O. Box.
-Intermediate Level Privacy-
(If you’re potentially mildly concerned about another person in your life,
take the above steps and the below steps too.)
These steps will allow you to keep information separate from the other person.
They will make it easier for you to leave as well,
if you realize you need to.
Steps, Separation and Structure
- Below are some more simple steps, separations and structures you can set up in your life.
- They will decrease the damage someone else can have on your: life, finances and safety.
- Tip: there are some questions you will need to ask each of the companies (for the supplements* and necessities*) to make sure you understand:
Such as:
-How they work (ie. the phone plan privacy features)
-Where/How information gets sent
*You will see below
→Note: the knitty gritty
I’m just teaching the overall structure in this article, and I’m likely passing up some of the knitty/gritty per the questions you may need to ask each company.
*Strong Supplements/Necessities:
Having a separate email and an allowed (for a 2nd bank account) seperate form of address, will likely be necessary too.
There’s easy ways to do this:
1. Email: (necessity)
-Mail.com (set up an email here with with a different password than he/she knows)
2. Second Address (necessity)
-Virtual Mailing Address (these may or may not work with some banks, click all links!)
Generally, business bank accounts may be more lenient, and or virtual bank accounts.
- Alternative Qualifying Physical Mailing Address: A Shelter, highly trusted friends house
Tip:
ask the bank what else can count as an official address, and what is needed if you choose to have a shelter as one.
3. Storage
(a supplement for those not in danger, but incredibly helpful if things go real south real fast)
-A Public Storage (ideally only known to you)
Keep anything you want to keep private in here, as well as some copies of important documents-information.
4. That Encrypted Flash Drive(s)!
(You can keep this at work, or in the storage)
-How to Use these 3 New Services-
Set up:
Use these services in conjunction with each other:
-To communicate (possibly with others)
-Store (proof, documents)
-Email
-Make/Store copies with
and more securely login to each-other and only with each-other
→(never connect them to your old accounts)
I’ll show you below how to do this..it’s not too tough!
⚠️ WARNING: if you use the same:
-Card
-Bank account
-Email you both share, to set up any of this,
-Phone number/text service
they will be notified of these new accounts/storage units.
⚠️Also: if you use the same address, they will receive the paper copies and notifications.
That’s why a Virtual Address, shelter or trusted friends house,
is important.
2. Create Separate and Private Bank Accounts
Many couples and others your close with, may share bank accounts.
Sometimes everyone will share the same email/number for this account too (some will have multi-factor authentication set up to receive the code when you login).
Other times: one person has more or less access and control.
- I strongly suggest you both have equal control over any account you both set up.
The Risk of Sharing One Bank Account:
To use a dating example:
if your girlfriend and you share the account and the money in it,
they can drain your money,
and block use of your account much easier,
if they have more power on the account.
The Simple Solution:
Have a separate bank account, whether brick and motor or electronic (like Chime).
Accessing the Account:
Make sure how you access that (when logging in), is separate too,
as well as how you receive login and updated information (electronic or mail).
i. A Separate Email and phone number to log in with
ii. And a separate device to log in with as well that is not used by the other person
How to do this:
Use your library computer, work computer or a separate smart phone/tablet your partner doesn’t have access too.
New Password:
A different login password(s), and email ensures the other person can’t access it, or if they find it, can’t guess the password.
Make sure you have a different PIN for the devices too.
Practical Financial Steps:
Start putting some money aside in this account.
Potential Explanation:
Maybe it’s your “emergency fund” in case your job falls though.
Or, even better, you just don’t tell anyone about it.
Like an emergency job fund, have 6-12 months worth of savings stored up.
Worst Case Scenario
If your bf/wife, shows signs that concern you, take (only) the amount of money in the shared account that’s yours, and transfer it over to the new one.
More Private and ways to transfer money out of your shared account:
A) Helpful Apps:
Peer to Peer transfer Apps (like a Business* Paypal), may help you do this with more flexibility and ease.
*business accounts (in general with these apps) can be set up more anonymously.
-You can use any new email and any business name, as your account.
-Only you will see your name as the real owner, provided the email/business name doesn’t have your personal information in it.
Impact:
This design will also will help you hide the last account you put it in (so they can’t see the new account number, ownership, or name of the bank).
“The people who receive money from you don’t have access to any personal information, including your bank account information or your credit card information”
-Safety from Thieves too
You also don’t have to worry about carrying the money in cash and getting robbed.
More helpful Tools:
PayPal has a debit card, that allows you to take money out of an atm, for after your money arrives in the account.
Find at: You can often find them at Walmarts, or CVS’s.
3. Phone and Internet Accounts
Phone and internet companies will tell you all your level of access and control options (however, make sure to ask), when you set up your account.
- Remember, the Master Account Holder/ “Parent Account”, has all the power.
- The manager, has the next level of power/control
- and those under that-the least if any.
Personally, make sure you both have equal power, and be aware of what the other one can see or not see (phone calls, locations, internet searches).
Worst Case Scenarios
If the master owner/manager becomes obsessive,
they can use tools that most companies offer,
that would allow them to monitor your calls, location and more.
I’d keep it equal, and let’s hope it never gets to that point.
-Advanced Level/Border Line Escape-
Get a Prepaid phone and calling card (minutes and data) and put it in your public storage
(Remember, don’t buy it with a card/account you both share)
⚠️ if you feel more than the steps above is necessary:
it may be time to go to my escape plan post (Escape Now)
🛑 If your on a device they have access to, stop using it now,
and go to the:
-library,
-you/your friends work
or even an
-apple/computer store,
and use the computers there.
🛑 Article: Signs Your Phone is Hacked
⚠️ Gut Feeling:
- If there’s no: Behavioral, verbal, electronic..or any other obvious sign(s) you're in danger…
but your gut is telling you to Get the F*ck out,
-then Get Out-
Follow me and or Subscribe to My Email List, if you want to stay up to date for my latest Security, Psychological and Tactical tips..
Thank you all for your support.
-The Tactical Victim-
It’s a Mindset, a New Way of Life 🔒