When someone gains access to a personal account without clear, ongoing permission, it can feel like a major violation. Whether it happens through password-sharing, hacking, spyware, or guesswork, unauthorised access can lead to emotional harm, identity theft, or further control.
When someone gains access to a personal account without clear, ongoing permission, it can feel like a major violation. Whether it happens through password-sharing, hacking, spyware, or guesswork, unauthorised access can lead to emotional harm, identity theft, or further control.
This type of abuse may involve reading private messages, deleting content, impersonating us, or changing account settings to limit access. In some cases, it’s part of a larger pattern of digital surveillance or coercive control.
Even if the person accessing the account is someone familiar—a partner, family member, roommate, or friend—it’s still a form of digital abuse. No one should have to give up privacy to stay safe, loved, or connected.
This section is for you if you’ve been pressured or forced into sharing your account passwords with someone, or been locked out of your own accounts. You might have found passwords or settings changed without your knowledge, seen unexpected changes to saved files or account recovery information, or had strange login alerts or security warnings you don’t recognise.
You might be feeling like your identity isn’t your own, and powerless to stop someone who always seems to be ahead. You might be ashamed—even though you didn’t do anything wrong—or confused about whether it’s really happening. The information in this section can help.
There are many ways someone can gain access to an account without permission. The most common methods involve emotional manipulation—like pressuring us to share passwords or pretending to act in our best interest. Other less common methods are technical, like hacking or installing spyware.
Having an account accessed without consent can feel like a loss of control—but unfortunately, it’s also incredibly common. Even if it feels personal or targeted, many tactics are widespread and used against countless people. There is no shame in being caught off guard by someone else’s intrusion. Here are some of the ways it can take place.
Unauthorised access doesn’t always start with hacking. Sometimes it’s a password shared in trust, that’s later used to control or monitor. Sometimes it’s someone staying logged in on a shared device, guessing a password, or resetting one without our knowledge. And sometimes, it’s not clear how it’s happening—just that someone keeps showing up in places they shouldn’t.
It’s normal to feel unsure, especially when the access comes from someone close. And it’s normal to feel upset, confused, angry, or anxious, even if we don’t have proof. If something doesn’t feel quite right, that’s reason enough to start looking into it.
We don’t need to have everything figured out to take action. Even small changes can help rebuild privacy and control. And no matter who accessed our account, or how—it’s not our fault.
AI is changing the way accounts are accessed and abused. In the past, someone might have needed passwords or direct access to a device. Now, AI tools can help people guess login details, impersonate others, or even bypass security checks—sometimes without needing much technical skill at all.
AI can make these tactics feel more advanced—and the pace of change can be overwhelming. It’s natural to feel confused or unsure how to keep up. We’ve listed out some of the ways AI is making unauthorised access easier, but remember: while the tools may be new, the behaviours are often familiar. At their core, these tactics are still about control, surveillance, and broken trust.
And just like before, survivors deserve support, autonomy, and digital safety—no matter how the technology evolves.
The clues that once helped us spot AI-generated content aren’t always reliable any more. Things like extra fingers in photos or blurry edges around objects were once common signs, but new tools are improving fast.
Instead of relying on those glitches, it’s more helpful to look at the bigger picture. These are some helpful questions to ask:
Trusting your instincts, asking questions, and slowing down can all help make sense of what you’re seeing or hearing.
Discovering that someone has accessed a personal account without permission can feel violating, disorienting, or frightening. Some people describe a deep sense of exposure—like their private thoughts or identity were no longer theirs. Others feel anxious, betrayed, or unsure who to trust.
We all respond in different ways, and that’s okay. Here are some reflections and questions survivors often share.
No one can fully control whether someone tries to access their accounts—but small steps can help limit opportunities for intrusion, make accounts harder to compromise, and support a greater sense of digital control.
Taking these steps can be exhausting—both emotionally and practically. It’s okay to move at your own pace and choose only the steps that feel manageable right now. No one should have to manage this alone. Support is available, and you deserve safety, privacy, and peace of mind.
It’s okay to say no to sharing accounts, passwords, or devices—even with someone you trust. Questions like “Who will be able to see this?”, “What happens if we stop sharing this account?”, or “Can I remove access later?” can help clarify expectations. If someone pressures, guilts, or threatens you into giving access—that’s not about trust. That’s a form of control.
Finding out that someone has accessed a personal account without consent can be upsetting, confusing, and difficult to trace. Whether the access happened recently or over time, support is available—and there are steps that can help us regain control.
This section explores someone accessing your accounts without your permission. This might happen through password sharing, guesswork, spyware, or emotional manipulation. It explains how account intrusion can feel like a loss of control, even when there’s no evidence we can see. It also includes practical prevention strategies, documentation tips, and ways to reset access and rebuild digital boundaries.
Account access without ongoing consent is a form of digital abuse.
The most common methods for unauthorised account access involve emotional manipulation.
Shared logins and saved devices are common ways someone can access your accounts.
AI tools can also be used to guess passwords or to pretend to be a person or organisation you trust.
We can take back control of our accounts by adjusting settings, protecting private information, and setting boundaries.
There are steps we can take if we decide to report.
Taking back control over digital accounts can feel intimidating—no one should have to do it alone. If the situation feels unclear or overwhelming right now, then this guide, and the support options listed on the previous page are here to return to at any time.