all-in-one privacy solution":["Proton Unlimited es una solución de privacidad todo en uno"],"Black Friday":["Black Friday"],"No ads. Privacy by default.":["Sin anuncios. Privacidad por defecto."],"People before profits":["Primero las personas, luego los beneficios"],"Security through transparency":["Seguridad con transparencia"],"The best Proton Mail ${ BLACK_FRIDAY } deals":["Las mejores ofertas de Proton Mail en el ${ BLACK_FRIDAY }"],"The world’s only community- supported email service":["El único servicio de correo electrónico del mundo financiado por la comunidad"]},"specialoffer:limited":{"${ hours } hour":["${ hours } hora","${ hours } horas"],"${ hoursLeft }, ${ minutesLeft } and ${ secondsLeft } left":["Tiempo restante: ${ hoursLeft }, ${ minutesLeft } y ${ secondsLeft }"],"${ minutes } minute":["${ minutes } minuto","${ minutes } minutos"],"${ seconds } second":["${ seconds } segundo","${ seconds } segundos"],"Limited time offer":["Oferta por tiempo limitado"]},"specialoffer:listitem":{"Create multiple addresses":["Cree múltiples direcciones"],"Hide-my-email aliases":["Seudónimos de hide-my-email"],"Quickly unsubscribe from newsletters":["Cancele suscripciones a boletines rápidamente"],"Use your own domain name":["Use su propio dominio"]},"specialoffer:logos":{"As featured in":["Tal como aparece en"]},"specialoffer:metadescription":{"Get an encrypted email that protects your privacy":["Obtenga un correo electrónico cifrado que protege su privacidad"]},"specialoffer:metatitle":{"Proton Mail Black Friday Sale - Up to 40% off":["Oferta de Black Friday de Proton Mail: hasta un 40% de descuento"]},"specialoffer:newmetadescription":{"Get up to 40% off Proton Mail subscriptions this Black Friday. Find great deals on our secure end-to-end encrypted email plans.":["Aproveche las rebajas de Black Friday y obtenga suscripciones de Proton Mail con hasta un 40 % de descuento. Encontrará las mejores ofertas en planes de correo electrónico seguro cifrado de extremo a extremo."]},"specialoffer:newmetatitle":{"Proton Mail Black Friday sale | Up to 40% off secure email":["Rebajas de Black Friday en Proton Mail | Hasta un 40 % de descuento en correo electrónico seguro"]},"specialoffer:note":{"* Billed at ${ TOTAL_SUM } for the first year":["*Con un costo de ${ TOTAL_SUM } durante el primer año"],"*Billed at ${ TOTAL_SUM } for the first 2 years":["*Con un costo de ${ TOTAL_SUM } durante los primeros 2 años"],"30-day money-back guarantee":["Garantía de devolución de dinero de 30 días"],"Billed at ${ TOTAL_SUM } for the first 2 years":["Con un costo de ${ TOTAL_SUM } durante los primeros 2 años"],"Billed at ${ TOTAL_SUM } for the first year":["Con un costo de ${ TOTAL_SUM } durante el primer año"],"You save ${ SAVE_SUM }":["Ahorre ${ SAVE_SUM }"]},"specialoffer:off":{"${ PERCENT_OFF } off":["-${ PERCENT_OFF }"]},"specialoffer:testimonial":{"I love my ProtonMail":["Amo mi Proton Mail"],"My favorite email service":["Mi servicio de correo electrónico favorito"],"Thanks Proton for keeping us all safe in the complicated internet universe.":["Gracias Proton por mantenernos a salvo en el complicado universo de Internet."],"You get what you pay for. In the case of big tech, if you pay nothing, you get used. I quit using Gmail and switched to @ProtonMail":["Obtiene aquello por lo que paga. En el caso de la gran tecnología, cuando uno no paga nada, se acostumbra. Dejé de usar Gmail y cambié a @ProtonMail"]},"specialoffer:time":{"Days":["Días"],"Hours":["Horas"],"Min":["min"]},"specialoffer:title":{"And much more":["Y mucho más"],"Safe from trackers":["A salvo de rastreadores"],"Stay organized":["Mantenga todo en orden"],"Black Friday email deals":["Ofertas en correo electrónico del Black Friday"],"Don’t just take our word for it":["No confíe solo en nuestra palabra"],"Make your inbox yours":["Tome posesión de su bandeja de entrada"],"Our story":["Nuestra historia"],"Transfer your data from Google in one click":["Transfiera sus datos de Google con un solo clic"]},"specialoffer:tooltip":{"Access blocked content and browse privately. Includes ${ TOTAL_VPN_SERVERS }+ servers in ${ TOTAL_VPN_COUNTRIES }+ countries, connect up to 10 devices, access worldwide streaming services, malware and ad-blocker, and more.":["Acceda a contenidos bloqueados y navegue de forma privada. Incluye más de ${ TOTAL_VPN_SERVERS } servidores en más de ${ TOTAL_VPN_COUNTRIES } países, se conecta con hasta 10 dispositivos, accede a servicios de transmisión de todo el mundo, bloquea malware y publicidad y mucho más."],"Easily share your calendar with your family, friends or colleagues, and view external calendars.":["Comparta su calendario con familiares, amigos y compañeros fácilmente y consulte calendarios externos."],"Includes support for 1 custom email domain, 10 email addresses, 10 hide-my-email aliases, calendar sharing, and more.":["Incluye compatibilidad con 1 dominio de correo electrónico personalizado, 10 direcciones de correo electrónico, 10 seudónimos de hide-my-email, posibilidad de compartir calendario, etc."],"Includes support for 3 custom email domains, 15 email addresses, unlimited hide-my-email aliases, calendar sharing, and more.":["Incluye compatibilidad con 3 dominios de correo electrónico personalizado, 15 direcciones de correo electrónico, seudónimos ilimitados de hide-my-email, posibilidad de compartir calendario, etc."],"Manage up to 25 calendars, mobile apps, secured with end-to-end encryption, 1-click calendar import from Google, and more.":["Administre hasta 25 calendarios, apps móviles, protegido con cifrado de extremo a extremo, importación de calendario con 1 clic desde Google y más."]},"Status banner":{"Learn more":["Más información"],"Please note that at the moment we are experiencing issues with the ${ issues[0] } service.":["Tenga en cuenta que, en este momento, estamos experimentando problemas con el servicio ${ issues[0] }."],"We are experiencing issues with one or more services at the moment.":["En este momento, tenemos problemas con uno o más servicios."]},"Status Banner":{"At the moment we are experiencing issues with the Proton VPN service":["En este momento, tenemos problemas con el servicio Proton VPN."],"Learn more":["Más información"]},"steps":{"Step":["Paso"]},"suggestions":{"Suggestions":["Sugerencias"]},"Support":{"Sub category":["Subacategoria","Subcategorías"]},"Support article":{"${ readingTime } min":["${ readingTime } minuto","${ readingTime } minutos"],"Category":["Categoría","Categorías"],"Didn’t find what you were looking for?":["¿No encontró lo que buscaba?"],"General contact":["Contacto general"],"Get help":["Obtener ayuda"],"Legal contact":["Contacto legal"],"Media contact":["Contacto para medios"],"Partnerships contact":["Contacto para colaboradores"],"Reading":["Lectura"]},"Support Form Platform option":{"VPN for Android TV":["VPN para Android TV"],"VPN for Apple TV":["VPN para Apple TV"],"VPN for Chromebook":["VPN para Chromebook"]},"Support troubleshooting":{"App version":["Versión de la app"],"Browser":["Navegador"],"Check if this helps":["Compruebe si le sirve"],"Choose a product":["Elija un producto"],"Did this solve your issue?":["¿Le ha resultado útil para resolver el problema?"],"Faster assistance is just a few clicks away":["Solo le separan unos clics de una asistencia más rápida"],"How can we help?":["¿Cómo podemos ayudarle?"],"No, contact support":["No, contactar a soporte"],"Please fill out one field after another":["Complete un campo después de otro"],"Please make your selections":["Realice sus selecciones"],"Proton account":["Cuenta de Proton"],"Proton for Business":["Proton for Business"],"Thank you for your feedback":["Gracias por sus comentarios"],"What can we help with?":["¿En qué podemos ayudarle?"],"Yes":["Sí"]},"support_modal_search_query":{"Search query":["Consulta"]},"support_search_button":{"Search":["Buscar"]},"support_search_i_am_looking_for":{"I'm looking for":["Busco"]},"SupportForm":{"For a faster resolution, please report the issue from the Bridge app: Help > Report a problem.":["Para una resolución más rápida, reporte el problema desde la app Bridge: Ayuda > Reportar un problema."],"Information":["Información"]},"SupportForm:option":{"Account Security":["Seguridad de la cuenta"],"Contacts":["Contactos"],"Custom email domain":["Dominio de correo electrónico personalizado"],"Email delivery and Spam":["Entrega de correo electrónico y spam"],"Encryption":["Cifrado"],"Login and password":["Inicio de sesión y contraseña"],"Merge aliases and accounts":["Combinar alias y cuentas"],"Migrate to Proton":["Migrar a Proton"],"Notifications":["Notificaciones"],"Other":["Otros"],"Plans and billing":["Planes y facturación"],"Proton for Business":["Proton for Business"],"Sign up":["Regístrese"],"Storage":["Almacenamiento"],"Users, addresses, and identities":["Usuarios, direcciones e identidades"]},"SupportForm:optionIntro":{"Select a topic":["Seleccione un tema"]},"Testimonial":{"Awards":["Premios"],"Customers":["Clientes"],"Featured":["Destacados"],"Go to testimonial source":["Ir a la fuente testimonial"],"Open source of award":["Abrir fuente del premio"],"Open source of quote":["Abrir fuente de la cita"],"Reviews":["Reseñas"],"Videos":["Videos"],"Watch on TikTok":["Ver en TikTok"],"Watch on YouTube":["Ver en YouTube"]},"TestimonialCategory":{"Awards":["Premios"],"Customers":["Clientes"],"Featured":["Destacados"],"Media":["Medios"],"Reviews":["Reseñas"],"Videos":["Videos"]},"Text":{"If you need help, check out our ${ supportLink }.":["Si necesita ayuda, consulte nuestra ${ supportLink }."],"The page you’re looking for might have been removed, or it could be an\nold link.":["Es posible que la página que busca haya sido eliminada o que sea un\nenlace antiguo."],"Your question may already have an answer in our knowledge base:":["Puede que haya respuesta a su pregunta en nuestra base de conocimientos:"]},"Title":{"On this page":["En esta página"],"Related articles":["Artículos relacionados"],"Share ${ thisPage }":["Compartir ${ thisPage }"],"Switch to Proton Pass - Contact us":["Cambie a Proton Pass - Contáctenos"],"Thank you!":["¡Gracias!"],"this page":["esta página"]},"tooltip_vpn":{"Access blocked content and browse privately. Includes ${ TOTAL_VPN_SERVERS }+ servers in ${ TOTAL_VPN_COUNTRIES }+ countries, highest VPN speed, ${ TOTAL_VPN_CONNECTIONS } VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Acceda a contenidos bloqueados y navegue de forma privada. Incluye más de ${ TOTAL_VPN_SERVERS } servidores en más de ${ TOTAL_VPN_COUNTRIES } países, la mayor velocidad VPN, ${ TOTAL_VPN_CONNECTIONS } conexiones VPN, servicios de transmisión en todo el mundo, bloqueador de malware y publicidad y mucho más."]},"vpn_servers":{"Get Proton VPN Plus":["Obtener Proton VPN Plus"]},"wallet_signup_2024:Action":{"Get Proton Wallet":["Obtener Proton Wallet"]},"wallet_signup_2024:Homepage hero product link title":{"Wallet":["Wallet"]},"wallet_signup_2024:Homepage product navigation bar":{"Wallet":["Wallet"]},"wallet_signup_2024:menu item":{"Bitcoin guide":["Guía sobre Bitcoin"],"Proton Wallet news":["Novedades sobre Proton Wallet"],"Proton Wallet support":["Soporte para Proton Wallet"]},"wallet_signup_2024:Pricing":{"Includes everything in Proton Unlimited and":["Incluye todas las funciones en Proton Unlimited y"],"Limited availability":["Disponibilidad limitada"],"The easiest way to securely own, send, and receive Bitcoin":["La forma más fácil de retener, enviar y recibir Bitcoin con seguridad"]},"wallet_signup_2024:ProductRange":{"Discover Proton Wallet":["Descubra Proton Wallet"],"Store and transact Bitcoin privately with an encrypted self-custody wallet.":["Almacene Bitcoin y negocie de forma privada con una cartera de autocustodia cifrada."]},"wallet_signup_2024:wallet bitcoin":{"Learn about Bitcoin, the Internet's value network.":["Infórmese sobre Bitcoin, la red de valor de internet."]},"wallet_signup_2024:wallet overview":{"Ensure you're always in control of your Bitcoin.":["Asegúrese de tener siempre el control de su Bitcoin."]},"wallet_signup_2024:wallet security":{"The encrypted, open-source wallet that puts you in control.":["La cartera cifrada de código abierto que le permite controlarlo todo."]}}},"base":"blog","cdn":{"enabledForAssets":true,"enabledForImages":true,"url":"https://pmecdn.protonweb.com/"},"unleashApi":"https://account.proton.me/api"};
window.frameworkContext = frameworkContext;
const context = frameworkContext.base === '' ? '' : `${frameworkContext.base}/`;
window.__toAssetUrl = (filename) => {
if (frameworkContext.cdn !== undefined && frameworkContext.cdn.enabledForAssets === true) {
return `${frameworkContext.cdn.url}${context}${filename}`;
} else {
return `/${context}${filename}`;
}
};
})();
Dealing with cyberstalking: How to protect your privacy and stay safe online | Proton
With the proliferation of smartphones and social media, cyberstalking is on the rise(nueva ventana). Compared to traditional stalking, cyberstalking can be a more threatening form of aggression as cyberstalkers can hide behind the anonymity of the internet and terrorize their victims around the clock. However, there are measures you can take to protect yourself and your privacy.
In this article, we’ll explain what cyberstalking is, how cyberstalking invades your privacy, and what you can do to protect yourself and stay safe online.
What is cyberstalking?
The non-profit organization Protection Against Stalking(nueva ventana) defines stalking as “a pattern of fixated and obsessive behavior that is repeated, persistent, and intrusive. It causes fear of violence or engenders alarm and distress in the victim”. Cyberstalking is the online extension of traditional stalking and is carried out using online tools such as social media, email, and chat rooms.
While traditional stalking often involves physical harassment or assaults, unwanted phone calls, and blackmail letters, cyberstalking includes threats of physical violence, online privacy invasions, and technological attacks.
Unlike traditional stalking, cyberstalking does not require close physical proximity to the victim. Instead, it occurs on an omnipresent scale, and has the capacity to do significant harm to the victim’s emotional well-being, social relationships, and reputation through online means.
Who is behind cyberstalking?
Most cyberstalkers have or used to have a relationship with their victims. They may be a former partner, coworker, or acquaintance. Most cyberstalkers harass their victims for one or more of the following reasons:
To take revenge on a grievance they may hold towards a victim.
To demean, embarrass, or scare the victim.
To damage the victim’s reputation.
To track the victim’s whereabouts without them knowing.
To steal the victim’s identity and impersonate them online.
According to preliminary research(nueva ventana) conducted by Leroy McFarlane and Paul Bocji, cyberstalkers usually fall under four profiles:
Vindictive: A vindictive cyberstalker is known for their ferocious attacks on their victims. Their stalking tendencies involve both online and offline harassment.
Composed: A composed cyberstalker typically has no relationship to their victim, and their only goal is to inflict distress and annoyance.
Intimate: An intimate cyberstalker is someone who is trying to gain the victim’s attention and/or enter into a relationship with them.
Collective: Collective cyberstalkers involve two or more individuals who work together to harass their victim.
Cyberstalking as an invasion of your privacy
The ease and convenience of the internet have led to an uptick in cyberstalking crimes. What you post online can reveal a lot about you, and with a bit of research, a cyberstalker can easily access your personal information. If you own multiple social media accounts, a cyberstalker can glean information from each account and construct a detailed profile of you.
Additionally, if a cyberstalker gets a hold of your computer, they can even install spyware to track your online interactions, purchases, reading habits, browsing history, and more. Other examples of cyberstalking include:
Sending you manipulative, threatening, or harassing emails
Hacking into your online accounts (such as banking and email) to change your passwords and impersonate you
Posting your private information and photographs on online forums and chat rooms
Encouraging others to join in on the harassment and spread rumors about you
How to protect yourself against cyberstalking
A cyberstalker can compromise your privacy and intimidate you and your loved ones. The first step to preventing cyberstalking is to post as little information about yourself as you can on the internet.
Here are some tips you can take to reduce your digital footprint and protect yourself against cyberstalking.
Tip #1: Review your privacy settings on social media
When you post on social media, you’re sharing more than just the post’s content. You might also be sharing information such as:
The time you made the post
Your location
Personal information about yourself, including gender, date of birth, and contact information
Who your friends and family are
Other links to your social media profiles
By reviewing your privacy settings and restricting social media, you can make intentional choices about what content gets shared, with whom, and where. This reduces the likelihood of a cyberstalker discovering information that might endanger your privacy.
Tip #2: Use a VPN
Using a VPN has many benefits(nueva ventana), but one of its biggest advantages is providing you with a greater level of anonymity(nueva ventana). When you connect to a VPN, all of your online traffic is routed through an encrypted tunnel and becomes unreadable to third parties, including your ISP and cyberstalkers. Instead of your real IP address, a cyberstalker only sees the IP address of the VPN server you’re connected to. This masks your physical location, protecting you from potential cyberstalkers.
With a VPN, you can surf the internet privately and securely without worrying that your information might fall into the wrong hands.
Tip #3: Create strong passwords for online accounts
Practicing good password hygiene goes a long way in keeping your online accounts secure against cyberstalkers. According to a Verizon report from 2020(nueva ventana), 36% of data breaches involve weak or stolen passwords.
If you struggle to remember multiple complex passwords for different online accounts, try using a password manager(nueva ventana). A good password manager will generate and save strong passwords(nueva ventana) for you, keeping your online accounts safe. The only password you will need to remember is your master password, which enables you to sign in to your password manager.
Alternatively, you can create a passphrase(nueva ventana) consisting of a series of words. Passphrases are more secure and easier to remember than a typical password. Changing the capitalization of letters and replacing some letters with numerical and symbolic substitutes can make your passphrase a lot stronger. A secure and complex passphrase might look something like this: Oper@teElseCartOccas!on52.
Tip #4: Enable two-factor authentication
Two-factor authentication (2FA) adds an additional layer of security to your online accounts by requiring a second form of identification. Even if a cyberstalker somehow gets a hold of your username and password, they will not be able to gain access to account data if you have 2FA enabled.
You can activate 2FA on an online account and verify your identity through an authenticator app installed on your mobile device. Every time you log in to an online account, your authenticator app will generate a unique code for you to enter before you can gain access to your account. This ensures that a cyberstalker cannot access your online accounts unless they also have possession of your mobile device.
Tip #5: Use email aliases
Email aliases are a great way to organize your inbox and filter out spam(nueva ventana), but they can also help preserve your online privacy. Since email addresses often consist of first and last names, creating an email alias without your full name can help you stay more anonymous while registering for online accounts and newsletters.
Tack on a plus sign (+) to your current email address. For example, if your email address is johnsmith@proton.me, your email alias could be johnsmith+newsletters@proton.me. All emails sent to your email alias will land in your inbox as usual.
However, if your goal is to stay as anonymous as possible, you should not create an email alias from an existing email address that contains your real name. Instead, you should set up a new email address that doesn’t reveal your true identity.
Tip #6: Record and block all suspicious activity
If you suspect that someone is stalking you online, the first thing you should do is to block the person on all channels. If you move fast to block the cyberstalker’s opportunities to harass you, they may lose interest quickly. You should also add the cyberstalker’s email address to your Block List(nueva ventana), so their messages land directly in your spam folder.
Additionally, you should gather evidence by keeping a log of stalking-related incidents as they occur. Be sure to include information such as:
Date and time of the incident
Description of the incident
Location of the incident
Witnesses to the incident
Recording all stalking incidents and behaviors will prove useful if you decide to file for criminal prosecution or a protective order.
Use Proton Mail to protect yourself against cyberstalking
As a privacy-first company, our vision is to create a safer and better internet where everyone is in control of their data. Cyberstalking is a threat not only to your security but also your privacy. We believe you should be able to access the internet without worrying if your data might be stolen and how it might be used against you.
If you’re concerned about having a cyberstalker, you can use Proton Mail to defend your online privacy and security:
End-to-end encryption: If you and your recipient both use Proton Mail, you can send end-to-end encrypted emails(nueva ventana) to each other. This means your emails cannot be intercepted in transit or accessed by anyone except you and your recipient.
Password-protected Emails: Use our Password-protected Emails(nueva ventana) feature to send encrypted emails to your recipients who do not use Proton Mail. To read the email, they must enter a previously agreed-upon password.
Spam filtering, Allow List, and Block List: We use a smart spam detection system to filter out unwanted emails. You can also easily route your cyberstalker’s emails to your spam folder by adding their email address to your Block List.