If you think your partner may be spying on you, this guide shows how to browse safely, hide sensitive information, and protect your digital privacy.
This guide explains how to stay safe online when you’re being abused, especially if your partner might be spying, tracking your activity, or using shared devices to monitor your plans.

If They Control the Phone — They Can Control Everything
Online Safety is very important!
She knows your passwords.
She shares your accounts.
She finishes your sentences because she already read your texts.
If you’re living with or escaping from someone abusive, online safety isn’t optional — it’s survival.
Signs She Might Be Monitoring You
- She knows things you never told her
- She finishes your private sentences before you say them
- She’s always “accidentally” logging in to your email or messages
- She gets upset when you use incognito mode or delete browser history
- She knows your location — even when you didn’t share it
Even if you’re not sure how, it’s very possible she’s monitoring your digital activity.
Step 1: Stop Using Shared Devices for Sensitive Tasks
Don’t plan your exit, log your abuse, or search terms like “how to leave safely” on:
- A shared computer
- A family tablet
- A phone she set up
- A work device (unless secure and private)
Use a friend’s device, a public library computer, or buy a cheap burner phone.
Step 2: Create a Burner Email for Your Planning
Use a neutral provider like ProtonMail or Gmail.
Keep it short, bland, and unrelated to your name.
Use this email to:
- Back up your abuse log
- Save important documents or notes
- Subscribe to resources (without her seeing)
- Register a second device or cloud drive
Step 3: Use Incognito Mode — But Don’t Rely on It Alone
Incognito helps hide local search history.
It does not hide:
- Sites from your router
- Monitoring software
- Some spyware apps
Assume incognito is helpful — but not bulletproof.
Step 4: Change These Passwords Immediately (If Safe to Do So)
- Cloud storage (Google Drive, iCloud, OneDrive)
- Online banking
- Medical portals
- Phone lock PIN or biometric
- Social media
- Amazon or delivery apps (if used for gifts or supplies)
Use 2FA (two-factor authentication) on a new device or phone number only.
Step 5: Watch Out for Spyware and Monitoring Apps
Common tools she might use:
- Life360 (family GPS tracker)
- mSpy, FlexiSpy, uMobix (spy apps often hidden in plain sight)
- Shared iCloud or Google accounts
- Bluetooth trackers (tiles in wallets, keychains, etc.)
If you’re unsure, don’t confront her. Just start using a separate device.
Step 6: Backup Your Abuse Log Safely
Back it up to:
- A USB drive you carry or hide
- A private cloud folder under your burner email
- A hidden note app on a secured phone (labeled something harmless)
Step 7: Don’t Share Plans or Vent Publicly
No vague posts. No emotional captions. No “I’m done” status updates.
She’ll see it — or someone she knows will — and it may trigger backlash.
Final Word
In an abusive relationship, your browser history can be used against you. So can your location. So can your silence.
Digital privacy is not about paranoia — it’s about power.
Control your info, control your options, and protect your path forward.
Recommended Reading
[# FirstSteps] – For survivors just waking up to what’s happening
[How to Leave Safely When You’re Living With an Abuser]
[# SafetyPlanning] – All exit prep tools in one place