The translation was automatically locked due to following alerts: Could not merge the repository.
Loading…
None
String updated in the repository |
- **Document harassment:** It is helpful to document the attacks or any other incident you may be witnessing: take screenshots, save the messages you receive from harassers, etc. If possible, create a journal where you can systematize this documentation recording dates, times, platforms and URLs, user ID, screenshots, description of what happened, etc. Journals can help you detect possible patterns and indications about your possible attackers. If you feel overwhelmed, try to think of someone you trust who could document the incidents for you for a while. You should deeply trust the person who will manage this documentation, as you will need to hand them over credentials to your personal accounts. Before sharing your password with this person, change it to something different and share it via a secure means - such as using a tool with [end-to-end encryption](https://www.frontlinedefenders.org/en/resource-publication/guide-secure-group-chat-and-conferencing-tools). Once you feel you can regain control of the account, remember to change your password back to something unique, [secure](https://ssd.eff.org/en/module/creating-strong-passwords), and that only you know.
- О том, как документировать инциденты, рассказывается в [Советах по документированию для жертв технологических злоупотреблений и сталкинга](https://www.techsafety.org/documentationtips/).
|
Glossary
English | Russian | ||
---|---|---|---|
No related strings found in the glossary. |