WAG

Guide

Digital Privacy & OpSec

Protecting your identity, finances, and digital trail — a practical framework for operational security.

Operational security — OpSec — is the practice of protecting sensitive information from reaching unintended audiences. In the context of engaging with the sex industry, OpSec isn't about paranoia; it's about pragmatism. Even in jurisdictions where sex work is fully legal, most people have legitimate reasons to keep their activities private. This guide covers every layer of your digital and physical footprint, from your phone's settings to the cash in your wallet.

Threat modeling first: Before implementing any of these measures, ask yourself three questions: What am I protecting? From whom? What's the realistic risk level? A single person living alone has different OpSec needs than a married person with a shared family computer and joint bank accounts. Scale your precautions to your actual situation.


Why OpSec Matters

There are several distinct threats that OpSec protects against, and understanding them helps you prioritize which measures to implement.

Legal Exposure

Even in places where sex work is legal, related activities (solicitation, certain forms of advertising, operating a venue) may not be. Digital communications can become evidence. In jurisdictions where buying sex is criminalized (the Nordic model), your texts, call logs, payment records, and location data could all be used against you. Even a single text message recovered from a provider's phone during an unrelated investigation could create legal problems.

Relationship Exposure

For those in relationships, the consequences of discovery can be devastating — divorce, custody battles, financial ruin, social stigma. Digital evidence is the most common vector for discovery. An errant notification on a shared tablet, an unexpected credit card charge, a Google Maps timeline showing an unexplained stop, or a browser's autocomplete suggesting a familiar escort site — any of these can unravel everything.

Identity Theft & Blackmail

When you share personal information with providers for screening purposes, you're trusting that information to be handled securely. Most reputable providers are discreet and delete screening data after verification. But data breaches happen, phones get stolen, and not everyone is trustworthy. If your real name, employer, and photo are connected to sex work activity, that information could theoretically be used for blackmail or extortion.

Professional Consequences

Certain professions — law, politics, education, military, clergy, healthcare — carry heightened reputational risk. A publicly exposed connection to the sex industry, even in a legal context, can end careers. Security clearance holders face additional scrutiny. Public figures face media exposure. Even in less high-profile professions, a data leak connecting you to sex work could affect employment.


Device Security

Your phone is the single biggest OpSec risk you carry. It contains your communications, photos, location history, search history, app installations, and payment information — all in one device that can be lost, stolen, searched at a border crossing, or examined by a partner.

The Dedicated Device Approach

The gold standard is a completely separate phone used exclusively for hobby-related activities. This doesn't need to be expensive — a prepaid Android phone purchased with cash works perfectly. The key rules for a dedicated device:

  • Never link it to your real name, primary email, or primary phone number
  • Set it up with a new Google/Apple account created specifically for this purpose
  • Never connect it to your home or work Wi-Fi (use mobile data on a prepaid SIM or eSIM purchased separately)
  • Store it somewhere secure — not in your daily bag, car glovebox, or anywhere a partner might find it
  • Keep it powered off when not in use to prevent background location tracking

If a dedicated device isn't feasible, you need to be meticulous about your primary phone's security. The following subsections apply whether you use a dedicated device or your primary phone.

Location Services

Your phone constantly tracks your location and stores that data in multiple places. Critical steps:

  • Google Maps Timeline: If you use Google Maps, your every movement is logged by default. Go to Google Maps > Your Timeline and either disable it entirely or manually delete entries for sensitive locations. Better yet, turn off Location History in your Google account settings.
  • Apple Significant Locations: iPhones store "Significant Locations" under Settings > Privacy > Location Services > System Services. Review and clear this regularly.
  • App-level location permissions: Review which apps have location access. Ride-share apps, weather apps, camera apps, and social media all track location. Set permissions to "While Using" rather than "Always" where possible.
  • Wi-Fi and Bluetooth scanning: Even with GPS off, your phone can be located via Wi-Fi and Bluetooth. Disable these when visiting sensitive locations if you're using your primary phone.

Photo Metadata (EXIF Data)

Every photo taken on a smartphone contains metadata — including the exact GPS coordinates where it was taken, the time and date, the device model, and sometimes even the direction the camera was facing. If you send a photo to a provider or post one on a forum, this metadata goes with it unless you strip it.

  • On iPhone: When sharing photos, tap the share button, then tap "Options" at the top and disable "Location" before sending.
  • On Android: Use the "Remove location" option when sharing, or use an EXIF stripping app before sending any photos.
  • General rule: Never send a photo taken at your home, office, or any identifiable location to someone you don't fully trust. The metadata alone can reveal your address.

Cloud Sync Dangers

Critical risk: Cloud photo syncing (iCloud Photos, Google Photos) is one of the most common OpSec failures. A photo taken on your phone can instantly appear on your iPad, your laptop, your partner's shared family photo stream, or your Apple TV screensaver. Screenshots of conversations, photos from sessions, or even downloaded provider photos can sync without your knowledge.

  • If you share a family iCloud account, any photo you take or screenshot you capture may be visible to every device on that account
  • Google Photos backs up everything by default — including screenshots of conversations and downloaded images
  • WhatsApp, Telegram, and Signal all auto-download received media to your camera roll unless you disable this setting
  • Solution: Disable cloud photo sync entirely on the device you use for hobby activities. On a shared account, at minimum disable "Shared Photo Library" and "My Photo Stream."

Notification Previews & Lock Screen

A notification popping up on your lock screen while your phone is sitting on the kitchen counter can reveal everything in an instant. Configure your phone to hide message previews:

  • iPhone: Settings > Notifications > Show Previews > "When Unlocked" (or "Never")
  • Android: Settings > Notifications > On Lock Screen > "Hide sensitive content"
  • For specific apps, disable lock-screen notifications entirely
  • Consider disabling notifications for sensitive apps altogether and checking them manually

Biometrics & Device Access

In many jurisdictions, law enforcement can compel you to unlock your phone with a fingerprint or face scan, but cannot compel you to provide a PIN or password. A strong alphanumeric passcode (not a 4-digit PIN) is more legally defensible. Also consider: does your partner know your phone's unlock code? If so, a separate device with a different code is the only reliable solution.


Communication Security

How you communicate with providers is a critical OpSec decision. Not all messaging platforms are created equal.

Messaging Apps Ranked by Security

1. Signal (Best) — End-to-end encrypted by default for all messages and calls. Minimal metadata retention. Disappearing messages feature (set a timer and messages auto-delete). Open-source protocol. Does not store your contacts on their servers. The gold standard for private communication. Set disappearing messages to 24 hours or less for hobby-related conversations.

2. Telegram (Good with caveats) — Regular chats are NOT end-to-end encrypted; only "Secret Chats" are. Make sure you're using Secret Chats for anything sensitive. Offers self-destructing messages in Secret Chats. Popular among providers in many markets. The major downside: regular Telegram messages are stored on Telegram's servers and can theoretically be accessed by Telegram or compelled by legal authorities.

3. WhatsApp (Acceptable) — End-to-end encrypted by default (uses the Signal protocol). However, owned by Meta, which collects significant metadata (who you message, when, how often, your IP address). WhatsApp backups to Google Drive or iCloud are NOT encrypted by default — enable encrypted backups if you use this. Very widely used by providers globally, especially in Europe and Latin America.

4. SMS/iMessage (Worst) — Regular SMS is completely unencrypted and stored by your carrier. iMessage is encrypted between Apple devices but SMS fallback is not. Your carrier has records of every text. SMS messages can be subpoenaed. Avoid SMS for any hobby-related communication if possible. If you must use SMS, a burner number (see below) is essential.

Burner Numbers

Never contact a provider from your primary phone number. Your real number can be reverse-searched to reveal your name, address, and social media profiles. Options for anonymous numbers:

  • Google Voice: Free, reliable, works well in the U.S. and Canada. Requires a Google account (use a dedicated one, not your primary). Can make calls and send texts. Downside: linked to your Google account, so ensure that account has no identifying information.
  • Hushed: Paid burner number app. Numbers from multiple countries. No real identity required. Disposable numbers that can be discarded and replaced.
  • MySudo: Creates complete virtual identities — phone number, email, even virtual credit card numbers. Excellent for comprehensive compartmentalization. Paid subscription.
  • Prepaid SIM: In many countries, you can buy a prepaid SIM card with cash and no ID requirement. Pop it into a burner phone and you have a completely untraceable number. Regulations vary by country — some now require ID for SIM purchases.

Email Aliases

If a provider requires email contact or you need an email for website registrations, never use your primary email. Options:

  • ProtonMail: Encrypted email based in Switzerland. Free tier available. Can be created without providing any identifying information. The best option for a dedicated hobby email.
  • SimpleLogin: Creates email aliases that forward to your real email. The sender never sees your real address. You can create and destroy aliases at will. Excellent for website registrations.
  • Tutanota: Another encrypted email provider, similar to ProtonMail. Based in Germany.
  • Disposable email services: Guerrilla Mail, Temp Mail, etc. Good for one-time registrations but not for ongoing communication (addresses expire).

What Metadata Reveals

Even when message content is encrypted, metadata — who contacted whom, when, how often, and from where — can be extraordinarily revealing. Your phone carrier knows every number you've called or texted. Your internet provider knows every website you've visited (unless using a VPN). Email headers contain your IP address. Even encrypted apps reveal that you have them installed (your app list is visible to anyone who picks up your phone). Metadata analysis can build a very clear picture of your activities without ever reading a single message.


Financial Privacy

Money leaves trails. Every electronic payment creates a record that persists indefinitely — on your bank statement, in the payment processor's database, and in the recipient's records. Financial privacy is one of the most important and most commonly neglected aspects of OpSec.

Cash Discipline

Cash is king for financial privacy in the sex industry. It leaves no digital trail, no bank statement entry, and no receipt. But using cash effectively requires discipline:

  • Withdraw ahead of time. Don't use an ATM at or near the provider's location — ATM transactions record the machine's location and are timestamped. Withdraw cash during normal errands, from ATMs you regularly use.
  • Withdraw in round, normal-looking amounts. A $300 withdrawal looks different than your usual $60 grocery run. Spread cash withdrawals over time if you need a larger amount, or withdraw from a secondary bank account that your partner doesn't monitor.
  • Use a secondary bank account. An account solely in your name, with statements going to a P.O. box or email only you can access, eliminates the risk of a partner seeing unusual cash withdrawals.
  • Don't carry more cash than the session fee. If something goes wrong — robbery, shakedown — you lose only the session cost, not your entire wallet.

Why Digital Payments Leave Trails

Venmo, Zelle, PayPal, CashApp — all of these create records. Venmo has a public feed by default. Zelle transactions appear on your bank statement. PayPal stores complete transaction histories. CashApp is slightly better but still linked to your bank account. None of these should be used for hobby-related payments unless absolutely necessary, and if you must use them, use an account not linked to your primary bank.

Bank Statement Management

If you share finances with a partner, every line on your bank and credit card statements is a potential exposure point. Beyond obvious payments to providers, watch for:

  • ATM withdrawals at unusual locations or times
  • Hotel charges (for outcalls at hotels you booked)
  • Ride-share charges to/from provider locations
  • Purchases at nearby convenience stores (condoms, mints, etc.)
  • Charges from websites (forum memberships, advertising sites, review sites)

The simplest solution: a separate bank account with online-only statements sent to a dedicated email. Many online banks (Chime, Current, etc.) make this easy to set up.

Cryptocurrency

Some providers accept cryptocurrency, which can offer additional privacy. Bitcoin, despite its reputation, is not truly anonymous — transactions are recorded on a public blockchain and can be traced back to exchanges where you verified your identity. Privacy-focused cryptocurrencies like Monero offer stronger anonymity. If using crypto: buy from a non-KYC exchange or use a Bitcoin ATM with cash, use a dedicated wallet, and understand that blockchain analysis firms can potentially link transactions if you're careless about wallet hygiene.


Physical OpSec

Digital trails are the most common OpSec failure, but physical evidence can be just as damning. Think about the complete picture of your physical movements and evidence.

Time Management & Alibis

If you need to account for your time, plan ahead. A session plus travel time plus buffer might consume 2-3 hours. Where were you? The gym, a long errand run, helping a friend move, a work event — whatever your cover story is, make it consistent and plausible. Don't fabricate complex alibis that require corroboration; simple is better. "I went to the gym and then grabbed lunch" is harder to disprove than "I was at Dave's house helping him with his deck."

Scent & Physical Evidence

  • Shower after every session. Perfume, body lotion, natural scent — all detectable. If you can't shower immediately, at minimum wash your hands and face, and change your shirt if possible.
  • Keep a change of clothes. A spare shirt in your gym bag or car is a simple, effective measure.
  • Check for lipstick, makeup, hair. Before you head home, do a thorough visual check. Makeup transfer on collars and faces is a classic tell.
  • Cologne caution: Don't wear distinctive cologne to a session — if you come back smelling different (washed-off cologne, replaced by a provider's perfume), it's noticeable. Wear the same cologne you always wear, applied normally.

Receipts, Parking, & Tolls

  • Toll transponders (E-ZPass, SunPass, etc.) log every toll crossing with a timestamp. If your route doesn't make sense for your cover story, pay tolls with cash or take an alternate route.
  • Parking garages and meters increasingly use license plate recognition. Street parking with cash meters is safer. Don't park directly at the provider's building if discretion matters.
  • Keep receipts from your cover story activities (gym visit, grocery store) to add plausibility if questioned.

Ride-Share History

Uber and Lyft store your complete ride history — pickup, drop-off, time, route, and fare. If you share a family account or your partner has access to your phone, this is a glaring exposure point. Options: use a separate ride-share account linked to your burner number and a separate payment method, take public transit, drive yourself, or use traditional taxi services (paid with cash).

Hotel Booking Privacy

If you book a hotel for an outcall, the booking creates records — credit card charge, loyalty program points, booking confirmation emails. Use a hotel booked under a separate credit card with statements going to a private email. Don't use loyalty program accounts that your partner has access to. Some hotels accept cash at check-in with a cash deposit for incidentals — call ahead to ask. Boutique hotels and motels are generally more flexible than chain hotels.


Online Presence

VPN Usage

A VPN (Virtual Private Network) encrypts your internet traffic and masks your IP address from websites you visit. Essential if you're browsing escort sites, review forums, or any hobby-related content from a device connected to your home or work network.

  • Recommended providers: Mullvad (anonymous signup, accepts cash), ProtonVPN (Swiss-based, free tier), NordVPN, ExpressVPN
  • Use a VPN every time you access hobby-related websites, even from your phone's mobile data
  • Avoid free VPNs — if you're not paying, your data is the product. Many free VPNs log and sell your browsing history
  • Note: A VPN hides your activity from your ISP and network administrator, but the VPN company itself can see your traffic (unless using a no-log provider). Choose accordingly.

Search History & Autocomplete

Your browser's autocomplete is trained on your past searches and visited URLs. If your partner picks up your laptop and starts typing "es..." in the address bar, you don't want it auto-completing to an escort site. Solutions:

  • Always use private/incognito mode for hobby browsing (no history, no cookies, no autocomplete training)
  • Use a separate browser entirely — install Firefox or Brave and use it only for hobby-related browsing, while keeping Chrome for daily use
  • Consider a separate browser profile (Chrome profiles, Firefox containers) if a separate browser isn't practical
  • Regularly check your Google search history (myactivity.google.com) and YouTube history if you're signed into Google

Forum Pseudonym Discipline

If you participate in hobby forums (review sites, discussion boards), maintaining pseudonym discipline is critical:

  • Use a username that has zero connection to any other online identity — not your gaming handle, not a variation of your real name, not a reference to your hobbies or location
  • Don't reuse passwords across hobby and non-hobby accounts (use a password manager like Bitwarden or 1Password)
  • Be careful what personal details you share in posts — mentioning your profession, city neighborhood, vehicle type, or pet's name can help someone piece together your identity
  • Don't upload photos that could be reverse-searched or contain identifying EXIF data
  • Register forum accounts with your anonymous email, not your real one

Social Media Cross-Contamination

Social media platforms are aggressive about connecting related accounts. If you view a provider's Instagram from your main account, Instagram may suggest your profile to them (and vice versa). Facebook's "People You May Know" algorithm uses location data, phone contacts, and browsing patterns — if you and a provider are frequently in the same location with your phones, Facebook may suggest you as connections. The solution: never access provider social media from your real accounts. Use your dedicated device or an anonymous browser session.


Travel OpSec

Border Device Inspection

When crossing international borders, customs officers in many countries (including the U.S., Canada, UK, and Australia) have the legal authority to inspect your electronic devices — including asking you to unlock your phone and browsing its contents. If your phone contains hobby-related messages, photos, or apps, this is an exposure risk.

  • Before international travel, consider backing up and wiping your hobby device, restoring it after you've cleared customs
  • Alternatively, leave the hobby device at home and use a local prepaid SIM or eSIM at your destination
  • Remove sensitive apps before crossing borders (Signal, Telegram, hobby-related browser bookmarks) and reinstall after
  • If asked to unlock your device, understand your rights — they vary by country. In the U.S., citizens cannot be denied entry for refusing to unlock, but non-citizens can be

Hotel Wi-Fi

Hotel Wi-Fi is inherently insecure. Your traffic can potentially be monitored by the hotel, other guests on the same network, or anyone who has compromised the hotel's network. Always use a VPN on hotel Wi-Fi. Never access sensitive accounts (banking, email) over hotel Wi-Fi without a VPN. For maximum security, use your phone's mobile data (with VPN) instead of hotel Wi-Fi.

International SIM / eSIM Strategies

When traveling internationally for hobby activities, a local SIM or eSIM provides a local number (making you easier to contact for local providers), avoids international roaming charges, and creates separation from your home identity. Services like Airalo, Holafly, or local prepaid SIMs purchased at airport convenience stores work well. For eSIM-compatible phones, you can activate a local data plan before you even land.


Threat Modeling Framework

Not everyone needs every measure described in this guide. The appropriate level of OpSec depends on your personal threat model. Ask yourself these questions:

1. What am I protecting?

Your identity? Your relationship? Your career? Your legal standing? Each of these requires different protections. A single person with no security clearance and no professional reputation risk may only need basic digital hygiene. A married public figure in a jurisdiction where buying sex is illegal needs the full playbook.

2. From whom am I protecting it?

A curious partner? A vindictive ex? Law enforcement? A blackmailer? Your employer? Each adversary has different capabilities and different access to your information. A partner has physical access to your devices. Law enforcement can subpoena records. An employer can monitor work devices and networks.

3. What's the realistic risk level?

Are you engaging in legal activity in a jurisdiction with strong privacy protections? Your risk is relatively low — basic digital hygiene and financial separation may suffice. Are you in a jurisdiction where buying sex is criminalized and you're a public figure? Your risk is high, and you need comprehensive OpSec across every category.

The Minimum Viable OpSec Checklist

Regardless of your threat model, these baseline measures cost little effort and provide significant protection:

  • Use a burner number (Google Voice at minimum) — never your real phone number
  • Use a dedicated, anonymous email for any hobby-related accounts
  • Browse in incognito/private mode with a VPN
  • Pay in cash
  • Disable notification previews on your lock screen
  • Disable cloud photo sync or use a dedicated device
  • Don't discuss your activities with anyone who doesn't need to know

The best OpSec is behavioral. Technology can help, but no tool replaces good judgment. The most common OpSec failures aren't technical — they're human. Leaving a phone unlocked, bragging to a friend, getting sloppy with routines because "it's been fine so far." Stay consistent, stay cautious, and never assume you're too careful to make a mistake.