Safety Tips for Shared Devices
Guidance for navigating phones, computers, and accounts shared with an abusive partner.
Shared Device Safety Tips
Low-risk actions
These options are lower risk because they change less and are easier to explain or undo if needed.
- Log out of sensitive accounts after use
- Sign out of email, banking, and social media when you finish.
- Close browser tabs that show account dashboards or messages.
- Use “private” or “incognito” windows for short tasks
- Open a private window for quick searches or checking an account.
- Close the private window when finished so it does not stay visible.
- Use web versions instead of installing apps
- Access services (email, messaging, notes) in a browser instead of installing new apps.
- This avoids new icons appearing on the device.
- Adjust basic notification settings
- Turn off message previews on the lock screen where possible.
- Limit notification sound or banner alerts for sensitive apps.
- Keep sensitive files in neutral-looking folders
- Use plain folder names (for example, “Documents 2”) instead of attention-drawing labels.
- Avoid desktop shortcuts to sensitive files or websites.
- Use existing features instead of adding new tools
- Rely on built-in browser privacy settings before installing new security apps.
- Change only settings that are easy to return to default.
High-risk actions to avoid
These options can increase risk if the other person watches the device closely, checks histories, or reacts strongly to changes.
- Sudden password changes on shared accounts
- Changing shared account passwords (email, streaming, phone carrier) can be noticed quickly.
- Locked-out access can lead to questions or conflict.
- Deleting all history or messages at once
- Clearing an entire browser history or message thread may stand out if the person checks often.
- Consider more targeted, limited deletions instead of wiping everything.
- Installing obvious security or privacy apps
- New apps with names related to safety, security, or privacy can raise questions.
- Some apps show up in purchase or download histories.
- Turning off location services entirely
- A sudden loss of location information can be noticed if the person uses “Find My” or similar tools.
- They may receive alerts when location sharing stops.
- Creating secret new user accounts on the same device
- New profiles or log-in screens can be visible on startup.
- Storage usage or changed appearance might be questioned.
- Factory resets or major system changes
- Resetting the phone, tablet, or computer can remove data they expect to see.
- This may provoke demands for passwords or other access.
Browser privacy tools
Browser tools can help reduce the trail left on shared devices. Consider which options fit your situation and what the other person usually checks.
Private or incognito windows
- What it does
- Does not save browsing history, cookies, or searches after you close the window.
- Keeps most visited sites from automatically appearing in the address bar.
- Limits to be aware of
- Websites you log into may still record your activity in your account history.
- Network or account owners (for example, work or school IT) can still see traffic.
- Recently closed private windows may still be visible if the browser is left open.
Clearing specific items instead of everything
- Targeted history removal
- Delete single entries or a short time range from history instead of the full list.
- Remove search suggestions from the address bar that feel sensitive.
- Cookie and cache management
- Log out from specific sites rather than deleting all cookies.
- If you clear cookies, expect to be logged out of many sites the other person might notice.
Search and address bar suggestions
- Using neutral search terms
- Avoid repeated searches that clearly show safety or relationship topics if the bar is often checked.
- Consider using general terms and then navigating more carefully within results.
- Managing autofill
- Turn off or limit form autofill for sensitive names, emails, or addresses.
- Remove single saved entries that appear when you start typing.
Multiple browsers or profiles
- Using a different browser
- Some people use a less common browser on the same device for certain tasks.
- Be aware that installing a new browser can be noticed on the desktop, dock, or app list.
- Browser profiles
- Separate profiles can store different bookmarks and histories.
- However, visible profile icons or names may attract attention on a shared device.
For broader technology safety planning and information about how online activity can be tracked, some people review neutral resource lists found through sites such as DV.Support.
How to create separation safely
Creating more privacy around your technology is often a gradual process. These steps focus on reducing visibility while limiting sudden, noticeable changes.
Step 1: Map out what is currently shared
- List shared devices
- Phones, tablets, computers, smart TVs, game consoles.
- List shared accounts
- Email, cloud storage, app stores, phone plans, streaming accounts, smart home accounts.
- Note existing monitoring patterns
- How often they pick up or check your phone.
- Whether they review browser history, call logs, or locations.
Step 2: Start with low-visibility changes
- Use neutral-looking tools
- Note-taking apps or calendar events can hold reminders (for example, generic titles for appointments).
- Organize information off the shared device
- Consider keeping key phone numbers or notes written down on paper instead of only in the device.
- Store important information in locations the other person is less likely to inspect.
- Limit what automatically syncs
- Review which apps sync photos, notes, or messages to shared accounts.
- Turning off a single sync feature can be less noticeable than signing out of everything at once.
Step 3: Add a more private option over time
- Consider a secondary access point
- If safe, some people use a separate device, such as a low-cost phone, library computer, or workplace computer, for sensitive tasks.
- Think about storage, charging, and how this device could be discovered.
- Plan how you will explain it if found
- Some people prepare neutral explanations (for example, work, school, or project-related reasons).
- Only use an explanation that fits your real situation and feels sustainable.
- Keep sensitive contact details separated
- Phone numbers or email addresses for support services can be stored in a different location than everyday contacts.
Step 4: Review and adjust regularly
- Re-check what they can see
- Review lock screen, recent apps list, notification center, and browser history from their point of view.
- Look at cloud account dashboards to see recent activity summaries.
- Update your approach as patterns change
- If they start checking new areas (for example, call logs or app store history), adjust your habits around those features.
- Pause higher-risk changes if their monitoring or controlling behavior increases.
- Combine with a broader safety plan
- Device privacy is one part of overall safety. Consider how changes to technology might connect with housing, finances, transportation, and communication.