How to Cover Your Digital Tracks
A Guide to Seeking Help More Safely in a Connected World
If you’re living with abuse or know someone who is, there are important steps to take to hide digital tracks from the abuser.
Our world is more connected than ever, and many abusers are tech-savvy, using a wide range of ways to track and control. In addition to monitoring your browser, call, messaging and GPS history, they may use spyware on your devices to see what you’re doing in real time.
Here’s what you can do to cover your digital tracks, so you can find resources and communicate with others more safely.
Safer Searching and Browsing on Computers
When looking at information about abuse or communicating with others about your situation, here are the steps you can take to reduce the likelihood that your abuser will find out.
Use Incognito or Private mode so the sites you visit don’t get stored in your history. This will also make it more difficult for you to be tracked with spyware.
Delete your browser history and cache—and try to do this fairly often so it doesn't look unusual.
If your abuser knows or may expect you to be online, generate a browsing history they will not be suspicious of. To do this, open a tab (not in Incognito/Private mode), and visit websites you normally frequent, such as lifestyle blogs, social media or retailers, or search for mundane things like recipes or news.
Cell Phone, Email and Social Media Safety
Outside of work, most people communicate, access social media, check email, visit websites, and shop on their phones. Here are tips to help you stay as safe as possible on your phone:
Immediately delete any messages and emails you send or receive about abuse from accounts that could be accessed by your abuser. This includes text messages, voice messages/memos, and DMs on any apps (including encrypted apps like Signal). Don’t forget to empty trash folders, where deleted emails and messages will remain available for a period of time (usually for 30 days).
If you’re searching or visiting websites about abuse on your phone, always use Private mode. If you forget to do this, delete your history right away.
Never communicate through an app your abuser can access—for example, if they have your Facebook or Tik Tok password.
Log out of accounts when you’re done using them.
If you receive threatening messages, print and hide them somewhere safe—or follow the advice under “Saving Digital Evidence of Abuse” below. If you print any messages or evidence (such as photographs), turn off and unplug the printer for one minute afterward to delete the working memory.
Do not accept unsolicited friend/follower requests. Even if you get a friend request from someone you know, check with them directly before accepting it to ensure they are the person who sent it.
Be wary of hacking or spying attempts: don’t open messages from anyone you don’t know, never click on suspicious links, and watch for unusual language or content that suggests a friend has been hacked.
Turn on tracking notifications to get alerts if there are any AirTags, Tiles or other location tracking devices moving with you.
“Tip: If you find a physical tracker in your vehicle, bag or pockets, you can disable it by removing the battery. It’s entirely possible that it was placed there by a stranger—which is a strong excuse for disabling it if your abuser ever brings it up.”
Use Passwords to Your Advantage
If you have accounts your abuser does not have access to, you’ll want to keep them secure. Here’s how:
Create strong passwords, using letters, numbers and symbols that will only be familiar to you—not your abuser.
Never reuse passwords (or iterations of passwords) that are or have been used for any accounts your abuser has access to.
Never save these passwords in your browser for convenience, and never write them down.
Change your passwords often.
Check Devices for Spyware and Hacking
Spyware has made it easier than ever for abusers to monitor people, and tech-savvy abusers may also know how to hack or clone your device. Here’s how to watch for this:
Regularly check the list of apps on your phone and delete any you don’t recognize.
If your computer or phone has virus software installed, run it regularly. Just be sure it’s reputable, as malware can be disguised as virus protection software.
Pay attention to signs your device may have been hacked:
It’s running slowly or reboots often
Your battery drains quickly (this can happen with older cell phones or in cold weather, so watch for sudden changes in battery performance)
Abnormally high data use
Apps opening automatically
Calls that you didn’t make
People tell you they’re receiving messages you haven’t sent
Alerts of logins from devices you don’t recognize
No texts or calls are coming through
If you find spyware or suspect your device has been hacked or cloned, know that your abuser could be monitoring your searches or communication.
“If you have accounts your abuser does not have access to, you’ll want to keep them secure. ”
Consider Your Vehicle’s Navigation and Ride-Hailing Apps
Your vehicle’s navigation and ride-hailing apps can be used to monitor your movements. Here’s how you can stay safe if you’re seeking help from shelter outreach services, an abuse organization, or a professional such as a social worker or therapist:
Park your vehicle or get dropped off at a nearby location that won’t raise suspicion (e.g., a mall or coffee shop).
If there’s no reasonable place nearby, consider taking public transit or a taxi (paying with cash) from a location you frequent often.
Saving Digital Evidence of Abuse
You may want to save digital evidence of abuse, such as videos, voice messages or recordings of conversations. You may also want to save a digital log of any abusive incidents, emails, screenshots (of call records, text messages, DMs or social media posts).
Note: In Canada, it is legal to record a private conversation that you are participating in without informing other participants—i.e., your abuser. However, you should always prioritize your safety. You don’t want your abuser to know you are collecting evidence.
It’s crucial that any digital evidence is saved somewhere your abuser cannot access—such as a dedicated email account. Here’s how you could do this:
Choose a safe location outside your home network, such as your workplace, a public library, or the home of a trusted lifelong friend (someone who has no relationship with your abuser) to set up this account if you can.
Using Private/Incognito mode, set up a new email account that is not linked to any of your other accounts, your cell phone number, or any kind of payment. Use a strong password that only you would know, and memorize it (do not save it or write it down).
Forward all evidence to this email account. Immediately after forwarding any file, permanently delete the sent message, as well as any original file your abuser is not aware of (e.g., photographs, or a recording of a conversation). Then go to the device’s trash and empty it completely or select the individual files to delete permanently/immediately.
Only access this email account from devices your abuser could not have access to.
While it’s difficult (if not impossible) to cover your digital tracks with absolute certainty, this information can help you do so more safely.
For help by phone, call our 24/7 crisis line at 416-746-3701 (TTY 416-746-3716). Or call 911 in an emergency.