The manual on how to create digital self-defense guides for SWs is out!
Download How To Cypher Sex: a manual for collective digital self-defense guides.
Identity Management
To protect herself against stalking or outing, Eve has created a completely different work identity that cannot be connected to her official one, or to the identity she uses with her family and friends.
Choosing a Name
Like many pro dommes, Eve has chosen a work name that sounds cool, but on commercial social networking platforms her username is Eve Pentest Adams. She has added a real-sounding surname to her work name and, although this sounds boring, there is an important reason.
A Phone for Each Identity
Eve wants to be sure that her work identity can never be connected to her official one - not by stalkers, or neighbours, or even by state authorities.
Anonymous Connections
When Eve connects to the internet for her work she prefers to leave as few traces as possible – for example the IP address of her home connection.
Eve's Tips on Email
When she started looking for an email provider that would be good to use for work, Eve already knew that there is no such thing as a secure email.
Secure Passwords
To be sure her accounts cannot be hacked into, Eve uses strong and unique passwords for each of her accounts.
Eve's Online Accounts
To advertise her services, Eve uses both mainstream social networking platforms and specialized platforms for BDSM communities and sex work. At the same time, she uses different accounts on almost all these websites to also communicate with her family, friends, and lovers, but, of course, she uses different accounts for each of them.
Dedicated Pictures
To avoid someone connecting her work identity with other identities through a reverse image search, Eve never uses pictures she has published in other accounts on her work profiles or when communicating with her clients.
Terms of Use
Whenever Eve considers using a new service, the first thing she checks is the Privacy Policy and Terms of Service or Acceptable Use Policies of the service provider.
Different Payment Methods
Eve avoids using online payment methods that are connected to her real identity for purchases that can connect her to her work.
First Contact with Clients
Eve has several ways to be reached by new clients: they can write to her through a form on her website or through dedicated platforms like Tryst.
Staying in Touch with Clients
Once she has decided to arrange a session with a new client, Eve asks them to establish a more secure contact than email.
Eve Pentest's Work Website
Eve also has her own website to advertise her services in a place she owns and controls.
Dealing with Clients
Eve has a few rules on how she deals with clients, to give them (or others) zero chance of controlling her in case one of them turns out to be a stalker, or worse.
Privacy Protection is Important to Everyone
Respect for privacy is fundamental and sharing digital information should not only be based on trust.