From passwords and 2FA to removing unwanted access, this section walks through how to make your accounts yours again—quietly, calmly, and without tipping anyone off. Whether it’s email, social media, or banking, control starts here.
Phones and laptops often carry more of your life than you realise. This section helps you spot hidden risks, check for tracking, and safely take back control—especially if the device was gifted or set up “as a favour”.
Even if your apps are secure, your cloud and metadata might be telling a different story. These guides help you tidy up syncing, revoke shared access, and make sure your phone isn’t leaking location or history behind your back.
Thermostats, door locks, cameras—even light bulbs—can be turned into tools of control. This section shows you how to reclaim smart home devices, remove other users, and reset your space without drawing attention.
If things feel compromised or you’re preparing for a major shift (like moving out), these guides walk through secure resets, how to back up safely, and how to erase your trail. Quietly rebuild, without setting off alarms.
When your usual number or email isn’t safe, these tools offer alternative ways to call for help, get advice, or reach trusted contacts—without tipping off anyone watching. Includes secure apps, burner numbers, and cautious planning.
For friends, family, and professionals offering help—this section offers trauma-aware tech tips, what to say (and not say), and how to avoid accidentally making things worse. Including what to bring to police or court, and how to talk about digital abuse in ways they’ll understand.
From secure messaging to password managers, this section collects calm, discreet apps that support privacy without screaming “I’m hiding something”. Pick and choose what fits—no jargon, no overwhelm, just things that work.