Is someone checking your browsing?
This website will appear in your browser history. If you're concerned someone may be monitoring your internet use, consider using a trusted friend's device, a library computer, or your browser's private/incognito mode. You can press Quick Exit or hit Escape at any time to leave this site quickly.
Learn more about staying safe online
Someone searches through your digital history — old social media posts, archived content, or past online activity — to find things that can be used to embarrass, discredit, or blackmail you.
What You Might Notice
Old posts or content you'd forgotten about resurface
Things from years ago are suddenly being shared or referenced.
The other person references content from deep in your history
They've clearly spent time searching through your past.
What You Can Do
Review and clean up old social media posts
Most platforms let you delete or hide old posts. Consider a privacy review of your history.
Check what's visible on web archives
Sites like the Wayback Machine may have cached old content.
Adjust privacy settings on past content
Many platforms allow you to change the audience on old posts retroactively.
Important: This resource provides general information, not personal advice. Every situation is different. The actions suggested here may not be safe in your specific circumstances — particularly if the person causing harm could notice changes to your devices or accounts. Always consider your physical safety first.
If you need personalised support, contact 1800RESPECT (1800 737 732) or your local specialist domestic violence service. If you are in immediate danger, call 000.
Surfacing old posts, photos, messages, or other historical digital content to harm victim in their current context. Includes finding embarrassing teenage posts, old dating profiles, past political statements, or previously private content that can be taken out of context to damage victim's current relationships, employment, or reputation.
The TFA Matrix is a research framework under active development. Technique classifications, detection methods, and mitigations reflect current understanding and are subject to revision. This framework does not constitute forensic methodology, legal evidence standards, or clinical diagnostic criteria. Practitioners should apply professional judgement appropriate to their discipline and jurisdiction.