Keep your devices updated and patched
If you aren’t certain your email account is safe, please read this before communicating with us via email further. It’s very important to make sure that any conversations about your safety and security are completely private and confidential. If you have any concerns about your email security, we recommend using proton.me; protonmail is free, highly secure, and trusted. If you do choose to create an account there, please make sure to use a trusted device to create it, choose a username and password that you’ve never used before and to turn on logging under the security settings to log any login attempts.
Additional information can be found in the topics below.
A VPN (Virtual Private Network) is a tool that hides your internet activity from others on the same network, such as your home Wi-Fi. It works by routing your traffic through a separate server, masking what websites you visit and making it harder to track your online activity.
What a VPN protects you from
What a VPN does NOT protect you from
Choosing a VPN you can trust
How to use one
Bottom line A VPN is a useful layer of privacy but is not a complete solution on its own. It works best combined with other steps like using Signal and a secure browser.
If someone monitors your device or browsing activity, clearing your entire history can itself raise suspicion. The goal is to remove traces of specific activity while leaving normal browsing intact.
Delete specific pages instead of everything
Use a private/incognito window for sensitive browsing
Important things to know
Safer alternatives
Your safety is the priority. If you suspect your device is being monitored, using a different device is the safest option.
ProtonMail is already more private than most email providers, but a few simple steps will keep your account as secure as possible.
Set a strong, unique password
Enable two-factor authentication (2FA)
Set up a recovery method carefully
Watch out for phishing
Keep your devices secure
Check active sessions
Secure messaging apps protect your conversations by scrambling messages so that only you and the person you are sending to can read them. This is called end-to-end encryption. Even the app company itself cannot read your messages.
Why regular texting is not enough Standard SMS text messages are not encrypted and can be read by your carrier, law enforcement, or someone with the right tools. They can also appear in phone bill records showing who you contacted and when.
Apps you can trust
Recommended starting point Download Signal from your phone’s official app store. It is free, requires only a phone number to set up, and is trusted by security professionals worldwide
A P.A.C.E. plan is a simple but powerful emergency communication strategy. It stands for Primary, Alternate, Contingency, and Emergency and ensures you always have a way to reach the people who matter, even when your usual methods fail.
What each level means
Should you have one? Yes. Most people assume their phone will always work, but outages, natural disasters, and dead batteries are all common. A P.A.C.E. plan costs nothing to make and can be critical in a real emergency.
How to create yours
A simple written copy kept at home is often more reliable than a digital note during an actual emergency.
Two-factor authentication (2FA), sometimes called multi-factor authentication (MFA), adds a second layer of security to your accounts. Even if someone steals your password, they still can’t get in without the second factor.
The basic idea Logging in normally only requires something you know (your password). 2FA adds something you have, which is usually your phone.
Common types of 2FA
How to set it up (general steps)
After setup Each time you log in, you’ll enter your password and then open your app for the current code.
A burner phone is a cheap, prepaid cell phone that is not linked to your name, address, or existing accounts. You can buy it with cash, use it, and can dispose of it or stop using it at any time without it being traced back to you.
Why it can help If you’re concerned that someone is monitoring your primary phone through spyware, tracking your location, viewing your call logs through a shared account, or watching who you contact, a burner phone gives you a completely separate and private way to communicate.
How to get one
How to keep it private
Important limitations
SIM swapping is a scam where someone tricks your phone carrier into transferring your phone number to a SIM card they control. Once they have your number, they can receive your calls and texts, including 2FA codes, and use them to break into your accounts.
You will know immediately if this happens When a SIM swap occurs, your phone loses all service completely. You will not be able to call, text, or use mobile data. It will feel like your SIM card stopped working. This is not subtle, and it is the first sign something is wrong.
How it happens
How to protect yourself
If it happens to you
If you cannot safely access your phone or are being monitored, physical signals can be a discreet way to let a trusted neighbor or friend know you need help. This is sometimes called a “safety signal” system and takes just a little planning in advance.
How it works You and a trusted person agree ahead of time on a specific, ordinary-looking signal that means “I need help.” The signal should look completely normal to anyone who doesn’t know what it means.
Examples of signals you can use
Setting it up
Tips
The Address Confidentiality Program (ACP) is a free service offered by most U.S. states that helps survivors of domestic violence, stalking, or sexual assault keep their real address private.
How it works
What it protects
Who qualifies Eligibility varies by state, but most programs cover survivors of:
You typically need to apply through a state-certified advocate rather than on your own.
How to enroll
To find your state’s program, search for “[your state] Address Confidentiality Program.”
Ask our AI support assistant your questions about our platform, features, and services.