evidence
Safe Evidence Storage Options
The safest ways to store digital and paper evidence.
evidencestorage
SAFETY TOOLS
Safe Evidence Storage Options
Before You Choose a Storage Option
These options focus on ways to store screenshots, recordings, timelines, and other documentation so they are less likely to be found or deleted.
- Decide what types of evidence you want to store (texts, emails, photos, logs, documents).
- Check what devices you share with the other person, if any.
- Consider whether the other person knows your passwords or can access your accounts.
- Choose more than one storage option, in case one becomes unsafe or unavailable.
If you think your device or accounts might be monitored, consider using a different device or network when setting up storage options.
Using Cloud Storage Safely
Cloud storage means saving files to an online account instead of only on your device.
Options to Consider
- Services that work across phone, tablet, and computer.
- Accounts that are not logged in on shared devices.
- Storage with built-in encryption or secure sharing features.
Steps to Set Up a Safer Cloud Account
- Create a new email address that the other person does not know about.
- Use that email to set up a new cloud storage account.
- Choose a strong, unique password that you do not use anywhere else.
- Turn on two-factor authentication, using a method the other person cannot access (for example, an authenticator app on a separate device).
- Review connected devices in the account settings and remove any you do not recognize.
Storing Evidence in the Cloud
- Upload files from a device the other person cannot easily access, if possible.
- Organize evidence into clearly named folders (for example, by date or type of record).
- Use notes or text files to store timelines, incident logs, and summaries.
- Log out after each use if you are on a shared or risky device.
Reducing Visibility
- Turn off automatic syncing to shared devices.
- Clear browser history and downloads if using a shared computer.
- Consider using a private browsing window when accessing the cloud account.
Storing Passwords Safely with Password Managers
Password managers store and generate passwords for multiple accounts in one encrypted place.
Benefits for Evidence Storage
- Allows long, complex, unique passwords for email, cloud, and apps.
- Reduces the need to write passwords down or reuse them.
- Can store secure notes, such as account recovery codes or short logs.
Setting Up a Password Manager
- Choose a reputable password manager from a trusted source.
- Create a strong master password that is:
- Hard to guess, and
- Not reused from any other account.
- Do not share the master password with anyone you do not fully trust.
- Turn on two-factor authentication for the password manager, if available.
Using a Password Manager with Evidence
- Store login details for separate email and cloud accounts you use for documentation.
- Use “secure note” features to:
- Record dates and brief descriptions of incidents.
- Store backup codes for your accounts.
- Avoid installing the password manager on devices the other person controls, if that feels risky.
If the other person already has the master password to a password manager, consider that manager compromised and explore setting up a new, separate one on a safer device.
Using Hidden Device Folders
Some people use non-obvious folders or apps on their device to store evidence. This option can carry more risk if the other person regularly looks through the device.
Options for Less-Visible Storage on a Device
- Folders with neutral names that do not suggest anything sensitive.
- File management apps that allow “hidden” or “vault” folders.
- Apps that look ordinary but can store files behind a PIN or password.
Steps to Organize Hidden Folders
- Choose a folder name that blends in with your usual apps or work (for example, “Receipts_2025” or “Class_Notes”).
- Move screenshots and documents into that folder as soon as you create them.
- Avoid pinning the folder to your home screen or favorites, if that draws attention.
- Regularly back up files from the hidden folder to a safer option, like a cloud account or external storage kept elsewhere.
Risk-Reduction Tips for Hidden Folders
- Check if your photos or files also appear in “recent” or “trash” areas and remove them if needed.
- Turn off automatic photo backup to shared family accounts if that could expose your evidence.
- Review any “shared albums” or “shared folders” settings to confirm nothing is being shared without you realizing.
Hidden folders on a device can be discovered during casual browsing or by someone familiar with the device. Many people combine this method with cloud storage or trusted contacts to reduce that risk.
Involving Trusted Contacts in Evidence Storage
Trusted contacts can help store copies of evidence or hold login information for backup access.
Choosing Trusted Contacts
- People who are unlikely to share information with the other person.
- People who can keep digital or paper records private.
- People you can reach using more than one method (phone, email, messaging app).
Ways Trusted Contacts Can Help Store Evidence
- Holding copies of:
- Screenshots or printed messages
- Incident logs or summaries
- Important documents or photos
- Creating and maintaining a shared folder in their own cloud storage.
- Keeping sealed envelopes or USB drives in their home or office.
- Storing a list of accounts and passwords in a secure way, only to be used with your permission or in specific situations you agree on in advance.
Setting Clear Agreements
- Explain what you are asking them to store.
- Agree on how often you will update what is stored.
- Discuss how they should respond if the other person contacts them or asks questions.
- Decide how they should share information back with you if you change devices or lose access.
If you are working with advocates or legal professionals, you can ask whether they offer any evidence storage options or can help you review the safety of your current approach. Additional tools and professional supports may also be listed at DV.Support.
Combining Multiple Storage Methods
Many people choose more than one storage method to reduce the impact if one is discovered or becomes unavailable.
- Cloud storage plus a trusted contact who holds backup copies.
- Hidden device folder for short-term storage, with regular uploads to a safer cloud account.
- Password manager for logins and short notes, plus physical copies kept with a trusted contact.
Regular Review Checklist
- Review who has access to your accounts and devices.
- Update passwords if you think they may be known or guessed.
- Confirm that your evidence is backed up in at least one other place.
- Remove outdated or duplicate files from riskier locations.