If you’re filing for divorce, assume your devices are already compromised.

Short answer

If you are filing for divorce, assume your devices are already compromised. This is the operationally correct starting assumption. Shared cloud accounts, email forwarding rules, spyware marketed as parental controls. Access does not require hacking. It requires having been in a relationship with someone who knows your passwords and your patterns.

Not might be. Are.

This isn’t a worst-case scenario framing. It’s the operationally correct starting assumption. And the people who don’t start there tend to find out why they should have. after it’s too late to change anything.

Why the assumption matters

In a contested divorce, your digital life becomes evidence. Your messages. Your location history. Your browser history. Your emails. Who you called, when, and for how long.

Account access doesn’t require technical sophistication. It requires having been in a relationship with someone for years. They know your password patterns. They may have access to your email account, your iCloud, your Google account.

The six most common access vectors

Shared cloud accounts. If your photos, messages, or documents sync to a shared family iCloud or Google account, they are accessible to anyone with the account credentials.

Password knowledge. Most people reuse passwords or follow predictable patterns. A spouse of several years has seen you log in hundreds of times. (See: how your spouse is reading your messages.)

Shared devices. A tablet used by both of you. A laptop left unlocked. Physical access, even brief, is enough to check messages, review history, or install monitoring software.

Location sharing. Many couples set up family location sharing apps. Find My, Google Family Sharing, Life360 and then forget about them. If you haven’t checked, assume it’s still active.

Email forwarding rules. A rule configured in your email account that silently forwards a copy of every message to a second address. Takes two minutes to set up. Invisible unless you look for it specifically.

Spyware. Consumer-grade monitoring applications. marketed as parental controls or employee monitoring. are readily available, inexpensive, and hard to detect.

The assessment checklist

Check your active sessions. Every major platform. Google, Apple, Facebook, WhatsApp. shows you which devices are currently logged in. Review them.

Check your email forwarding rules. In Gmail: Settings > See all settings > Forwarding and POP/IMAP. In Outlook: Settings > View all Outlook settings > Mail > Forwarding.

Review app permissions on your phone. Specifically: which apps have access to your location, your microphone, and your camera. (See: signs your phone is being monitored.)

Check connected apps. In Google: myaccount.google.com/permissions. In Apple: appleid.apple.com > Sign-In and Security > Apps & Websites.

Frequently asked questions

Can my spouse track my phone during a divorce?

If location sharing is enabled on your device. through Find My, Google Maps, or a third-party app. yes. Check all sharing settings immediately.

Should I delete messages before filing for divorce?

No. Deleting messages after a dispute is reasonably anticipated can constitute spoliation of evidence in most jurisdictions. Before deleting anything, consult a lawyer.

What not to do

Don’t delete communications. Depending on your jurisdiction, deleting messages or documents after filing can constitute spoliation of evidence. Speak to a lawyer first.

Don’t use shared devices for anything sensitive. Not for research. Not for communication with your lawyer.


You don’t get to choose when the audit starts. You only get to choose whether you did one first.

Affiliate disclosure: this article contains a link to DeleteMe. We only affiliate with tools we use and trust.

There’s no perfect setup. Anyone selling you perfect is selling fear. The goal is simple: make yourself a harder target than the person next to you.

Similar Posts