Manual on how to create digital self-defense guides for SWs

The manual on how to create digital self-defense guides for SWs is out!

Download How To Cypher Sex: a manual for collective digital self-defense guides.

Read More

Identity Management

Identity Management

To protect herself against stalking or outing, Eve has created a completely different work identity that cannot be connected to her official one, or to the identity she uses with her family and friends.

Read More

Choosing a Name

Choosing a Name

Like many pro dommes, Eve has chosen a work name that sounds cool, but on commercial social networking platforms her username is Eve Pentest Adams. She has added a real-sounding surname to her work name and, although this sounds boring, there is an important reason.

Read More

A Phone for Each Identity

A Phone for Each Identity

Eve wants to be sure that her work identity can never be connected to her official one - not by stalkers, or neighbours, or even by state authorities.

Read More

Anonymous Connections

Anonymous Connections

When Eve connects to the internet for her work she prefers to leave as few traces as possible – for example the IP address of her home connection.

Read More

Eve's Tips on Email

Eve's Tips on Email

When she started looking for an email provider that would be good to use for work, Eve already knew that there is no such thing as a secure email.

Read More

Secure Passwords

Secure Passwords

To be sure her accounts cannot be hacked into, Eve uses strong and unique passwords for each of her accounts.

Read More

Eve's Online Accounts

Eve's Online Accounts

To advertise her services, Eve uses both mainstream social networking platforms and specialized platforms for BDSM communities and sex work. At the same time, she uses different accounts on almost all these websites to also communicate with her family, friends, and lovers, but, of course, she uses different accounts for each of them.

Read More

Dedicated Pictures

Dedicated Pictures

To avoid someone connecting her work identity with other identities through a reverse image search, Eve never uses pictures she has published in other accounts on her work profiles or when communicating with her clients.

Read More

Terms of Use

Terms of Use

Whenever Eve considers using a new service, the first thing she checks is the Privacy Policy and Terms of Service or Acceptable Use Policies of the service provider.

Read More

Different Payment Methods

Different Payment Methods

Eve avoids using online payment methods that are connected to her real identity for purchases that can connect her to her work.

Read More

First Contact with Clients

First Contact with Clients

Eve has several ways to be reached by new clients: they can write to her through a form on her website or through dedicated platforms like Tryst.

Read More

Staying in Touch with Clients

Staying in Touch with Clients

Once she has decided to arrange a session with a new client, Eve asks them to establish a more secure contact than email.

Read More

Eve Pentest's Work Website

Eve Pentest's Work Website

Eve also has her own website to advertise her services in a place she owns and controls.

Read More

Dealing with Clients

Dealing with Clients

Eve has a few rules on how she deals with clients, to give them (or others) zero chance of controlling her in case one of them turns out to be a stalker, or worse.

Read More

Privacy Protection is Important to Everyone

Privacy Protection is Important to Everyone

Respect for privacy is fundamental and sharing digital information should not only be based on trust.

Read More