Take back power

A strategic, survivor-centred response section.

If the threat model shows how digital abuse works, this section is about reclaiming space, confidence, and control—one step at a time. You don’t need to be a tech expert to take action. These aren’t magic solutions—but they’re solid steps toward safety, clarity, and autonomy.


Mapping impacts to responses

Matching common effects of digital abuse with realistic strategies for taking back control.

Who to talk to (and when)

Navigating support without wasting energy or walking into dead ends.

What to check first

Quietly regaining visibility into devices, accounts, and what’s being shared.

How to document digital abuse

Quiet, safe ways to capture and preserve digital evidence on your own terms.

Technical countermeasures

Practical ways to lock things down without tipping anyone off.