🔐 The LOCKED Method
A Digital Safety Framework
When you’re ready to take back control, the LOCKED method gives you a clear path forward.
Step by step. The most important actions, in the right order.
L — Log out of everything
Sign out of all devices linked to your accounts.
Check Apple ID, Google, Facebook, Instagram, and email.
Update your recovery email and phone number if they’ve had access.
O — Own your passwords
Change every password. Don’t reuse old ones.
Use a password manager like Proton Pass — it’s free, secure, and protected under Swiss privacy laws.
Your safety begins with your logins.
C — Check for stalkerware
If they’ve had physical access to your phone, they might’ve installed spyware.
Look for unfamiliar apps, strange battery usage, or admin permissions you didn’t enable.
(See [Recognising Stalkerware] for a full walkthrough.)
K — Keep your accounts private
Tighten your settings. Turn off location sharing.
Remove shared access, linked accounts, or joint devices.
Anything you once set up “as a couple” — lock it down.
E — Erase unsafe connections
Unlink shared calendars, delete Bluetooth pairings, turn off auto-login.
Check every setting that might quietly share your information.
This is your digital clean slate.
D — Disappear intentionally
Use a temporary phone or new email if needed.
Avoid triggering alerts as you make changes.
Go quiet online while you rebuild your safety — on your terms.
You don’t have to do it all at once.
You just have to begin — one LOCKED step at a time.