This piece will provide consumer privacy principles and concepts for a stalking victim who is being abused through internet stalking.
Create a new identity
Learn to tell “none of your business lies” as you surf the web. This mean using an alternate name to prevent stalking and switching from your true name to a pseudo name if you are a stalking victim.
Do not associate your true name with internet business or pleasure unless it is official business.
It’s fast, efficient, fun and easy. Everyone uses e-mail.
Learn to do it to for privacy protection purposes. Keep your true name off e-mails.
Encrypt e-mail if that makes you feel more secure.
Proxy servers are great-when they work.
Most of the time, they work fine, but a few have been known to fail at the most inopportune times. I use one.
Internet service providers
Those serious about their personal privacy, never, ever establish communication services in their own name.
Follow the serious privacy advocates and learn how to keep your communication system private. There are solutions, but you will have to do the due diligence and learn the ropes prior to implementing them. And ISP privacy, like telephone privacy, covered in a previous article, is key to stopping stalking from a cyber stalker who has you targeted as his internet stalking victim.
Use a debit gift card registered anonymously to protect your identity and lose the dangerous cyber stalker who may already have your credit card information.