Is someone checking your browsing?
This website will appear in your browser history. If you're concerned someone may be monitoring your internet use, consider using a trusted friend's device, a library computer, or your browser's private/incognito mode. You can press Quick Exit or hit Escape at any time to leave this site quickly.
Learn more about staying safe online
⚠
Cloud backups can contain a complete copy of your digital life. Securing your cloud accounts is critical.
Accessing Your Cloud Backups
Someone accesses your cloud storage or device backups — seeing your photos, documents, messages, and other data stored in services like iCloud, Google Drive, or Dropbox.
What You Might Notice
The other person has seen photos or documents you only stored in the cloud
They reference files you haven't shared with anyone.
Storage notifications about activity you didn't do
Files accessed, downloaded, or deleted without your knowledge.
Unfamiliar devices connected to your cloud account
Check which devices are linked to your iCloud, Google, or Microsoft account.
What You Can Do
Review which devices are connected to your cloud accounts
iCloud: Settings > Apple ID > Devices. Google: myaccount.google.com > Security > Your devices.
Change your cloud account password from a safe device
This is often the single most important step.
A cloud account password often controls everything — email, photos, backups, location.
Remove unknown devices and revoke their access
Sign out any device you don't recognise.
Important: This resource provides general information, not personal advice. Every situation is different. The actions suggested here may not be safe in your specific circumstances — particularly if the person causing harm could notice changes to your devices or accounts. Always consider your physical safety first.
If you need personalised support, contact 1800RESPECT (1800 737 732) or your local specialist domestic violence service. If you are in immediate danger, call 000.
Accessing victim's personal data through cloud backup services such as iCloud, Google Drive, OneDrive, or device backups. Cloud backups often contain comprehensive copies of messages, photos, contacts, browsing history, and app data, providing extensive surveillance capability from a single access point.
Cloud Account Security Change passwords and enable MFA on cloud storage. Review and remove sharing permissions.
SAFE-M-0054
Backup Encryption Enable encrypted backups where available.
Detection Indicators
ID
Detection Indicator
SAFE-D-0049
Cloud Access Alerts Sign-in alerts for cloud services from unfamiliar devices or locations.
SAFE-D-0050
Cloud Content Knowledge Adversary demonstrates knowledge of cloud-only content.
The TFA Matrix is a research framework under active development. Technique classifications, detection methods, and mitigations reflect current understanding and are subject to revision. This framework does not constitute forensic methodology, legal evidence standards, or clinical diagnostic criteria. Practitioners should apply professional judgement appropriate to their discipline and jurisdiction.