OSE SecureHub

OSE SecureHub

Remember:

Keep your devices updated and patched

Email Security

If you aren’t certain your email account is safe, please read this before communicating with us via email further. It’s very important to make sure that any conversations about your safety and security are completely private and confidential. If you have any concerns about your email security, we recommend using proton.me; protonmail is free, highly secure, and trusted. If you do choose to create an account there, please make sure to use a trusted device to create it, choose a username and password that you’ve never used before and to turn on logging under the security settings to log any login attempts. 

Are you using a shared computer or device?

If you’re using a shared computer and have concerns about monitoring, consider either using a trusted computer or selectively clearing the browser history.

Additional information can be found in the topics below.

Here are some additional tips for establishing and maintaining secure communication, whether it’s with us, your support system, or other allies:

A VPN (Virtual Private Network) is a tool that hides your internet activity from others on the same network, such as your home Wi-Fi. It works by routing your traffic through a separate server, masking what websites you visit and making it harder to track your online activity.

What a VPN protects you from

  • People monitoring traffic on your shared Wi-Fi network seeing which sites you visit
  • Your internet provider logging your browsing activity
  • Websites seeing your real location based on your IP address

What a VPN does NOT protect you from

  • Spyware or monitoring apps already installed on your device. A VPN does not remove or block these
  • Someone watching your screen directly
  • Tracking through accounts you are logged into, such as Google or Facebook
  • Your abuser knowing you are using a VPN, which could raise suspicion on its own

Choosing a VPN you can trust

  • ProtonVPN is free, well respected, and does not log your activity
  • Mullvad is paid but highly private and does not require an email to sign up
  • NordeVPN is another popular option
  • Avoid free VPNs from unknown companies. Many collect and sell your data, which is the opposite of private

How to use one

  1. Download a trusted VPN app from your phone’s official app store or the provider’s website
  2. Create an account if required and open the app
  3. Tap connect. That’s it. Your traffic is now protected

Bottom line A VPN is a useful layer of privacy but is not a complete solution on its own. It works best combined with other steps like using Signal and a secure browser.

If someone monitors your device or browsing activity, clearing your entire history can itself raise suspicion. The goal is to remove traces of specific activity while leaving normal browsing intact.

Delete specific pages instead of everything

  • In most browsers, open your history (Ctrl+H on Windows, Cmd+Y on Mac)
  • Find the pages you want to remove
  • Right-click the entry and select “Remove from history” or click the X next to it
  • This removes only those entries and leaves the rest of your history looking normal

Use a private/incognito window for sensitive browsing

  • Open an incognito or private window before visiting sites you don’t want recorded
  • When you close the window, that browsing is automatically not saved
  • Do this from the start of a session, not after the fact

Important things to know

  • Incognito mode does not hide activity from your internet provider or from monitoring software installed on your device
  • If spyware or a monitoring app is installed, it may record activity regardless of what you delete
  • Some browsers sync history across devices. If your browser is signed into a shared account, history may appear on other devices even after local deletion

Safer alternatives

  • Use a trusted friend’s device or a library computer for sensitive searches
  • Your work or school computer might be a safe option, but be aware web traffic might be monitored by your employer or school

Your safety is the priority. If you suspect your device is being monitored, using a different device is the safest option.

ProtonMail is already more private than most email providers, but a few simple steps will keep your account as secure as possible.

Set a strong, unique password

  • Use a password you don’t use anywhere else
  • Make it at least 12 characters, mixing letters, numbers, and symbols
  • Consider using a password manager (like Bitwarden or 1Password) to generate and store it

Enable two-factor authentication (2FA)

  • Go to Settings → Account → Two-factor authentication
  • Use an authenticator app like Google Authenticator or Authy — this is more secure than SMS
  • Save your backup codes somewhere safe (printed or in a password manager)

Set up a recovery method carefully

  • A recovery email or phone number can be used to regain access if you’re locked out
  • Store your recovery code in a safe and secure space
  • Use a recovery email that is also secured with a strong password and 2FA

Watch out for phishing

  • ProtonMail will never ask for your password via email
  • Always make sure you’re logging in at proton.me — check the URL before entering your credentials

Keep your devices secure

  • Lock your phone and computer with a PIN or password
  • Log out of ProtonMail on shared or public devices

Check active sessions

  • Go to Settings → Account → Active sessions to see where you’re logged in and remove any you don’t recognize

Secure messaging apps protect your conversations by scrambling messages so that only you and the person you are sending to can read them. This is called end-to-end encryption. Even the app company itself cannot read your messages.

Why regular texting is not enough Standard SMS text messages are not encrypted and can be read by your carrier, law enforcement, or someone with the right tools. They can also appear in phone bill records showing who you contacted and when.

Apps you can trust

  • Signal (most recommended): Free, open source, and widely considered the gold standard for private messaging. Messages, calls, and video are all encrypted. You can set messages to automatically delete after a set time
  • WhatsApp: Uses the same encryption as Signal but is owned by Meta (Facebook). Encrypted in transit but metadata (who you contact and when) is collected
  • iMessage: Encrypted between Apple devices only. Falls back to unencrypted SMS if the other person does not have an iPhone

Important things to know

  • The app is only as secure as the device it is on. If spyware is installed on your phone, messages can still be read on the screen
  • The person you are messaging also needs to use the same app
  • Signal allows you to set messages to disappear automatically, which reduces risk if someone accesses your phone later
  • Avoid apps that claim to be secure but are not well known or independently verified

Recommended starting point Download Signal from your phone’s official app store. It is free, requires only a phone number to set up, and is trusted by security professionals worldwide

A P.A.C.E. plan is a simple but powerful emergency communication strategy. It stands for Primary, Alternate, Contingency, and Emergency and ensures you always have a way to reach the people who matter, even when your usual methods fail.

What each level means

  • Primary: Your normal, everyday method of communication (texting, phone calls)
  • Alternate: A backup if your primary fails (a messaging app like Signal, email)
  • Contingency: A third option for when the first two are unavailable (a landline, a neighbor’s phone)
  • Emergency: A last resort when everything else is down (an in-person meeting point, a satellite communicator)

Should you have one? Yes. Most people assume their phone will always work, but outages, natural disasters, and dead batteries are all common. A P.A.C.E. plan costs nothing to make and can be critical in a real emergency.

How to create yours

  1. Write down one method for each of the four levels
  2. Choose a default out-of-area contact that everyone in your household knows to reach
  3. Pick a physical meeting location in case you cannot communicate at all
  4. Share the plan with everyone in your household and make sure they understand it
  5. Review it once a year to make sure contacts and methods are still current

A simple written copy kept at home is often more reliable than a digital note during an actual emergency.

Two-factor authentication (2FA), sometimes called multi-factor authentication (MFA), adds a second layer of security to your accounts. Even if someone steals your password, they still can’t get in without the second factor.

The basic idea Logging in normally only requires something you know (your password). 2FA adds something you have, which is usually your phone.

Common types of 2FA

  • Authenticator app (most secure and recommended) — An app on your phone generates a short code that refreshes every 30 seconds
  • SMS/text message A code is texted to your phone. It works, but is less secure than an app
  • Hardware key A physical USB device you plug in. Very secure, but requires purchasing a device (like a YubiKey)

How to set it up (general steps)

  1. Go to the security settings of the account you want to protect
  2. Look for “Two-factor authentication” or “2FA” and enable it
  3. If using an authenticator app, download Authy or Google Authenticator on your phone
  4. The website will show a QR code — scan it with the app
  5. Enter the 6-digit code the app shows to confirm it’s working
  6. Save any backup codes the site provides and store them somewhere safe

After setup Each time you log in, you’ll enter your password and then open your app for the current code.

A VPN (Virtual Private Network) is a tool that hides your internet activity from others on the same network, such as your home Wi-Fi. It works by routing your traffic through a separate server, masking what websites you visit and making it harder to track your online activity.

What a VPN protects you from

  • People monitoring traffic on your shared Wi-Fi network seeing which sites you visit
  • Your internet provider logging your browsing activity
  • Websites seeing your real location based on your IP address

What a VPN does NOT protect you from

  • Spyware or monitoring apps already installed on your device. A VPN does not remove or block these
  • Someone watching your screen directly
  • Tracking through accounts you are logged into, such as Google or Facebook
  • Your abuser knowing you are using a VPN, which could raise suspicion on its own

Choosing a VPN you can trust

  • ProtonVPN is free, well respected, and does not log your activity
  • Mullvad is paid but highly private and does not require an email to sign up
  • NordeVPN is another popular option
  • Avoid free VPNs from unknown companies. Many collect and sell your data, which is the opposite of private

How to use one

  1. Download a trusted VPN app from your phone’s official app store or the provider’s website
  2. Create an account if required and open the app
  3. Tap connect. That’s it. Your traffic is now protected

Bottom line A VPN is a useful layer of privacy but is not a complete solution on its own. It works best combined with other steps like using Signal and a secure browser.

A burner phone is a cheap, prepaid cell phone that is not linked to your name, address, or existing accounts. You can buy it with cash, use it, and can dispose of it or stop using it at any time without it being traced back to you.

Why it can help If you’re concerned that someone is monitoring your primary phone through spyware, tracking your location, viewing your call logs through a shared account, or watching who you contact, a burner phone gives you a completely separate and private way to communicate.

How to get one

  1. Purchase a prepaid phone with cash at a store like Walmart, Target, or a pharmacy
  2. Do not use a credit or debit card, as this creates a record linked to your name
  3. Buy prepaid minutes or a prepaid plan the same way, with cash
  4. Do not sign into any personal accounts (Google, Apple, email) on the device

How to keep it private

  • Store it somewhere your abuser will not find it
  • Do not bring it with you if your primary phone is also present, as some tracking methods can detect nearby devices
  • Do not call your regular phone number from it or contact people who might mention it
  • Turn it off and remove the battery when not in use if possible

Important limitations

  • A burner phone does not make you invisible. Emergency services can still find you if you call 911 but are unable to speak
  • Its main strength is giving you a private line your abuser does not know exists

SIM swapping is a scam where someone tricks your phone carrier into transferring your phone number to a SIM card they control. Once they have your number, they can receive your calls and texts, including 2FA codes, and use them to break into your accounts.

You will know immediately if this happens When a SIM swap occurs, your phone loses all service completely. You will not be able to call, text, or use mobile data. It will feel like your SIM card stopped working. This is not subtle, and it is the first sign something is wrong.

How it happens

  • A scammer contacts your phone carrier pretending to be you
  • They use personal information gathered from social media or data breaches to answer security questions
  • The carrier transfers your number to their SIM card
  • Your phone goes dead and they gain access to anything that uses your number for verification

How to protect yourself

  • Set a PIN with your carrier. Call your carrier and ask to add a SIM lock or port freeze. Anyone trying to make changes must provide that PIN first
  • Use an authenticator app instead of SMS for 2FA. Codes from an app live on your device and cannot be intercepted through SIM swapping
  • Limit personal information on social media. Scammers use publicly available details to impersonate you
  • Ask your carrier about additional account protection. Most major carriers offer extra security options on request

If it happens to you

  1. Your phone will have no signal at all. Find another phone immediately
  2. Call your carrier and report the unauthorized SIM swap
  3. Change passwords on your most important accounts right away
  4. Contact your bank if you believe financial accounts are at risk

If someone monitors your device or browsing activity, clearing your entire history can itself raise suspicion. The goal is to remove traces of specific activity while leaving normal browsing intact.

Delete specific pages instead of everything

  • In most browsers, open your history (Ctrl+H on Windows, Cmd+Y on Mac)
  • Find the pages you want to remove
  • Right-click the entry and select “Remove from history” or click the X next to it
  • This removes only those entries and leaves the rest of your history looking normal

Use a private/incognito window for sensitive browsing

  • Open an incognito or private window before visiting sites you don’t want recorded
  • When you close the window, that browsing is automatically not saved
  • Do this from the start of a session, not after the fact

Important things to know

  • Incognito mode does not hide activity from your internet provider or from monitoring software installed on your device
  • If spyware or a monitoring app is installed, it may record activity regardless of what you delete
  • Some browsers sync history across devices. If your browser is signed into a shared account, history may appear on other devices even after local deletion

Safer alternatives

  • Use a trusted friend’s device or a library computer for sensitive searches
  • Your work or school computer might be a safe option, but be aware web traffic might be monitored by your employer or school

Your safety is the priority. If you suspect your device is being monitored, using a different device is the safest option.

If you cannot safely access your phone or are being monitored, physical signals can be a discreet way to let a trusted neighbor or friend know you need help. This is sometimes called a “safety signal” system and takes just a little planning in advance.

How it works You and a trusted person agree ahead of time on a specific, ordinary-looking signal that means “I need help.” The signal should look completely normal to anyone who doesn’t know what it means.

Examples of signals you can use

  • A specific item placed in a window (a plant, a particular book, a colored cup)
  • Curtains or blinds in an unusual position (fully closed when they are usually open, or vice versa)
  • A porch light left on at an unusual time
  • A specific object placed near the front door or mailbox
  • Hanging a particular item of clothing outside

Setting it up

  1. Choose one trusted person who lives nearby or passes your home regularly
  2. Agree on one clear signal and what it means (“if you see X, call 911 and say you have a welfare concern”)
  3. Decide how often they should check, such as once in the morning and once in the evening
  4. Keep the signal simple and something that won’t be accidentally triggered

Tips

  • Only share the signal with one or two people to keep it secure
  • Change the signal periodically or if you think it has been noticed
  • Pair this with a P.A.C.E. plan so your contact knows exactly what to do when they see it

The Address Confidentiality Program (ACP) is a free service offered by most U.S. states that helps survivors of domestic violence, stalking, or sexual assault keep their real address private.

How it works

  • When you enroll, you receive a substitute address (usually a P.O. box managed by your state)
  • You use this substitute address for mail, official documents, and government records
  • Mail sent to the substitute address is forwarded to your real location by the state
  • Your actual address is kept confidential, even from most government agencies

What it protects

  • Voter registration records
  • Driver’s license and state ID
  • Court and legal documents
  • School enrollment records
  • Many other public records that would normally list your address

Who qualifies Eligibility varies by state, but most programs cover survivors of:

  • Domestic violence
  • Sexual assault
  • Stalking
  • Human trafficking

You typically need to apply through a state-certified advocate rather than on your own.

How to enroll

  1. Contact a local domestic violence organization or victim services agency
  2. Ask about your state’s ACP and request help applying
  3. A certified advocate will guide you through the paperwork
  4. Once approved, you receive your substitute address and program card

Important limitations

  • Not all businesses or private entities are required to accept the substitute address
  • The program covers mail but does not protect your address from all online data brokers

To find your state’s program, search for “[your state] Address Confidentiality Program.”

Antimanual

Ask our AI support assistant your questions about our platform, features, and services.

Chatbot Avatar
What can I help you with?