If your spouse uses an Android phone and is logged on to Google on a shared computer, you can type “Find My Phone” into the search bar, and you’ll be provided with the phone’s location.
As we become more reliant on GPS these days, you may also want to take a peek at your spouse’s location history. For Google users, the “previous destinations” menu option on the navigation system may chronicle your spouse’s movements; for Android users, the Google Timeline feature (found in the Google Maps app or Google Maps online if they are logged in) functions similarly.
It’s easy to make these files and even easier to distribute them unnoticed
You can find their frequent locations in Settings > Privacy > Location Services > System Services > Significant Locations. It takes a fair amount of effort to consistently disable or delete these types of settings so if they are up to no good, you’re likely to find something here.
Auto-fill is harder to remember. Search engines like Google do a reeters, based on everything you have ever searched before.
If you share a computer with a suspect spouse, you may intend to type “Megalodon,” and instead the words “Megan Granger home phone number” flash across the field. Take this a few steps further. Start typing each letter of the alphabet and see what pops up.
The most dangerous habit for cheaters is to send photos and video. These media may spice things up, but they are vivid evidence of an affair, and such materials can be used as evidence in divorce proceedings – especially if a betrayed husband or wife can save or download copies.
To keep these images and video covert, cheaters ple, the Keepsafe Photo Vault is designed to both store these media files and prevent others from accessing them. Many customers use Keepsafe for work or personal reasons, but if you notice that your spouse has a Keepsafe account and you can’t figure out why, you may be onto something.
Two similar services are Vault and Hide It Pro, which were created to store photos and video and protect them with a PIN. They also function similarly to cloud services like Google Drive, Dropbox and Apple’s Cloud, but security is their top priority. Be sure to check on Amazon Prime because this service gives you a place to store your photos, too.
If your cheater is savvy, he or she may know how to secretly embed an image into an audio or picture file. You think it’s a familiar song or a landscape shot but a steamy pose might be hidden behind the notes and trees.
Tools like DeepSound or QuickStego make this point-and-click work for the casual cheater. The snoop usually suspects nothing unusual. The files appear to be ordinary. You need to know a special keystroke or code to unlock the files.
Technological espionage is the least-healthy way to address these problems, and you should use these techniques only as a last resort. Infringing on your spouse’s privacy can cause even more damage, and certain kinds of infringements are bona fide illegal.
If they routinely access dating sites, especially hook-up services like Ashley Madison and AdultFriendFinder, they http://www.besthookupwebsites.org/tr/nostringattached-inceleme/ will probably think to cover their tracks, unless they like flirting with disaster as much as with attractive strangers
Many popular devices utilize some form of location technology and often make it easier to have the service turned on than to disable it. If your spouse uses an Apple device that is connected to a family account and they have enabled location sharing, you can locate their device by logging on iCloud and clicking on Find My iPhone or by using the Find My Friends app.