WAG

Provider Guide

Safety Technology for Providers

Technology won't replace good judgment, thorough screening, and solid safety protocols — but it can add powerful layers of protection. This guide reviews the specific tools, apps, and devices that providers use to stay safer, with honest assessments of what works, what doesn't, and what to watch out for.

No single tool is enough. Safety technology works best as layers in a defense-in-depth approach. A VoIP number protects your identity. A safe call app protects your physical safety. Encryption protects your communications. A VPN protects your browsing. Each tool addresses a different threat vector. The goal is overlapping protections so that no single failure leaves you exposed.

Safe Call Apps

A safe call system ensures that someone knows where you are and will raise the alarm if you don't check in. While a trusted friend with a phone works, dedicated apps add automation that removes human error from the equation.

App Comparison

  • Kitestring: Text-based check-in system. You set a timer before a session and designate emergency contacts. If you don't respond to the check-in text when the timer expires, Kitestring sends your pre-written alert message to your contacts. Pros: simple, works on any phone, no app download required. Cons: relies on text messages (which can fail), no GPS integration, service has been intermittent.
  • bSafe: Full-featured safety app with GPS tracking, automatic voice recording when SOS is triggered, live-streaming to emergency contacts, and a timer-based check-in. Pros: comprehensive features, intuitive interface, works internationally. Cons: requires the app installed, battery drain from GPS, your emergency contacts also need the app for full functionality.
  • Noonlight (formerly SafeTrek): Hold a button on the screen while you feel safe. Release it and enter a PIN when the session ends safely. If you release without the PIN — because you can't — the app dispatches emergency services to your GPS location. Pros: elegant design, connects directly to 911/emergency dispatch, no safe call person needed. Cons: involves police response which some providers specifically want to avoid, US-focused, monthly subscription.

DIY Safe Call Systems

Many providers prefer a personal safe call setup over apps. The standard protocol:

  1. Designate a trusted person as your safe call contact
  2. Before each session, send them: the client's name or identifier, the location, your expected session length, and a specific check-in time
  3. Agree on a check-in method — call, text, or a specific code word that confirms you're safe
  4. Establish a duress code — a word or phrase that sounds normal but signals danger ("I'm running ten minutes late" when you're never late)
  5. Define the escalation: if they don't hear from you within X minutes of the check-in time, they call you. If you don't answer, they call the location. If still no response, they contact emergency services

GPS & Location Sharing

Sharing your real-time location with a trusted person adds a critical layer — even if you can't communicate, someone knows where you are.

Options

  • Google Location Sharing: Works across Android and iOS. Share your real-time location with specific Google contacts, with time limits or indefinitely. Pros: free, reliable, cross-platform, no extra app for most people. Cons: requires a Google account, location accuracy depends on phone settings and signal.
  • Apple Find My: Share your location with anyone in your Apple contacts. Works with iPhone, Apple Watch, and AirTag. Pros: deeply integrated into Apple ecosystem, very reliable, AirTag can be hidden in belongings as a backup tracker. Cons: Apple-only ecosystem, person tracking you also needs Apple devices for full features.
  • Life360: Family and group location sharing with driving safety features. Pros: cross-platform, crash detection, location history, multiple circles for different trust levels. Cons: free tier has limited features, premium subscription required for full history and alerts, some privacy concerns about data selling.
  • WhatsApp Live Location: Share your live location in a chat for a set period (15 minutes to 8 hours). Pros: works inside an app you probably already use, easy to activate, end-to-end encrypted. Cons: limited duration options, recipient must have WhatsApp open to track in real-time.

Best Practice

Use location sharing with your safe call person during every outcall session. For incalls, your safe call person already knows your location — but consider keeping location sharing on anyway. If you ever need to leave your incall in an emergency and go somewhere unexpected, the trail is already active.


Security Cameras for Incalls

Cameras in your incall space serve multiple purposes: deterrence, evidence collection, and personal peace of mind. But they come with serious legal and ethical considerations.

Camera Options

  • Ring Indoor Cam: Affordable, reliable, cloud storage included with subscription. Motion-activated recording, two-way audio, phone alerts. Works well for entrance monitoring and common areas.
  • Wyze Cam: Budget-friendly with good image quality. Local storage via microSD card (no cloud required), motion detection, night vision. Strong option for providers who want footage stored locally rather than on corporate servers.
  • Blink Mini: Amazon-owned, tiny and easy to hide. Cloud storage via subscription or local storage via Blink Sync Module. Good for discreet monitoring of entry points.

Critical Legal and Ethical Considerations

  • Recording laws vary dramatically by jurisdiction. Some places require all-party consent for video recording, especially in spaces where privacy is expected. Recording a session without consent may be illegal regardless of your intent. Research your local laws thoroughly.
  • Entry areas vs session spaces: Many providers place cameras only at the entrance — recording who enters and exits, and when — and never in the session space itself. This captures identifying information for safety without recording intimate activity.
  • Disclosure: Consider posting a small notice that the entry area is monitored by security camera. This provides legal protection, deters bad behavior, and filters out clients who don't want to be seen entering. Many providers find that the deterrent effect alone makes cameras worthwhile.
  • Footage security: Your camera footage is extraordinarily sensitive. If stored in the cloud, ensure the account has strong authentication. If stored locally, encrypt the storage device. Delete footage on a regular schedule — keeping months of recordings creates an unnecessary liability.

Panic Button Devices

Wearable panic buttons provide a way to signal distress when you can't reach your phone. They're discreet, often disguised as jewelry or accessories, and can trigger alerts to emergency contacts or services with a single press.

Options

  • Apple Watch: Hold the side button to trigger SOS, which calls emergency services and texts your emergency contacts with your location. The most capable option if you're in the Apple ecosystem — but it's obviously a smartwatch, which some providers don't want visible during sessions.
  • Invisawear: Jewelry designed as a panic button. Necklaces, bracelets, and keychains that send your GPS location to up to five contacts when you double-press. Looks like regular accessories.
  • Revolar: A small clip-on device that sends alerts to contacts with your location via Bluetooth connection to your phone. Three alert levels: "check on me," "come get me," and "emergency." Discreet and easy to activate.
  • Personal alarms: Not smart devices, but loud. Devices like She's Birdie or SABRE emit 100+ decibel sirens when activated. The sound disorients an attacker and attracts attention. Inexpensive, no battery concerns beyond the alarm itself, and no digital footprint.

Placement Strategy

Keep your panic device somewhere you can reach it during a session without it being obvious. Options include: on a nightstand within arm's reach, clipped to the underside of a bed frame, worn as jewelry, or in a pocket of clothing that stays within reach. Practice activating it so the motion is automatic under stress.


VoIP Numbers

Your real phone number connects directly to your identity. A VoIP (Voice over Internet Protocol) number creates a barrier between your work communications and your personal life. This is one of the most basic and important OPSEC tools.

Service Comparison

  • Google Voice: Free US number, integrates with Google services, voicemail transcription, call screening, and blocking. Pros: free, reliable, good feature set. Cons: requires a Google account and an existing US phone number to set up, limited international availability, Google has full access to your communications.
  • TextNow: Free tier with ads, paid tiers available. US and Canadian numbers. Calling, texting, and voicemail. Pros: free option available, doesn't require an existing phone number to sign up, works as a standalone app. Cons: ad-supported free tier, number may be recycled if unused for extended periods.
  • Hushed: Privacy-focused VoIP service. Temporary or long-term numbers in multiple countries. Disposable number option for short-term use. Pros: strong privacy features, multiple numbers available, numbers from many countries, no personal information required. Cons: paid only (subscription or pay-as-you-go), less reliable than major providers for consistent daily use.
  • Burner: Disposable phone numbers designed for privacy. Create, use, and destroy numbers as needed. Pros: purpose-built for privacy, easy to create and discard numbers. Cons: paid subscription, US-focused, limited feature set compared to Google Voice.

Best Practices

  • Never use your VoIP number for personal accounts — it's work only
  • Don't link your VoIP account to your real name or personal email
  • Consider having two VoIP numbers: one for advertising and one for confirmed clients only
  • Set up voicemail with a professional greeting that doesn't include your working name (in case someone else is present when the caller listens)
  • Periodically search your VoIP number online to check if it's been linked to your identity anywhere

VPN Comparison for Providers

A VPN (Virtual Private Network) encrypts your internet traffic and masks your IP address. For providers, this means: your browsing activity is hidden from your ISP, your real location is concealed from websites you visit, and public WiFi becomes safe to use.

What to Look For

  • No-logs policy: The VPN provider should not keep records of your browsing activity. This has been independently verified for a handful of providers through audits. Claims alone aren't enough.
  • Kill switch: If the VPN connection drops, a kill switch instantly blocks all internet traffic. Without this, a momentary VPN disconnection exposes your real IP.
  • Server locations: More server locations mean more options for masking your apparent location. This matters if you're trying to appear to browse from a different city or country.
  • Speed: A VPN that slows your connection to a crawl is one you'll stop using. Fast enough for video calls and streaming is the benchmark.

Recommended Options

  • Mullvad: Privacy-first VPN. Accepts cash payment by mail. No email required to sign up — just a generated account number. Independently audited no-logs policy. Pros: strongest privacy stance in the industry, very affordable. Cons: smaller server network, no streaming optimization, basic interface.
  • ProtonVPN: From the makers of ProtonMail. Strong privacy pedigree, based in Switzerland. Free tier available with limited servers. Pros: trustworthy company, integrates with ProtonMail for a full privacy stack, free tier exists. Cons: free tier is slow, full features require paid plan.
  • NordVPN: Large server network, good speeds, strong feature set. Double VPN option routes through two servers. Pros: fast, user-friendly, works well for streaming and general use, extensive server network. Cons: past security incident (disclosed and addressed), corporate ownership structure less privacy-focused than Mullvad or Proton.

Use your VPN always — not just when you're "doing something sensitive." Consistent use prevents the pattern where your ISP sees VPN activation only during work hours, which itself reveals information.


Encrypted Messaging

Standard SMS messages and many popular messaging apps are not secure. They can be intercepted, subpoenaed, read by the platform operator, or accessed if either person's device is compromised. Encrypted messaging addresses this.

Deep Dive on Options

  • Signal: The gold standard for encrypted messaging. Open-source, end-to-end encrypted, disappearing messages, no metadata retention. Pros: strongest security, trusted by security researchers, free, cross-platform. Cons: requires a phone number to register (use your VoIP number), smaller user base means some clients won't have it.
  • WhatsApp: End-to-end encrypted by default using the Signal protocol. Pros: massive user base (clients are more likely to have it), file and location sharing, voice and video calls. Cons: owned by Meta, collects metadata (who you talk to and when), cloud backups can be unencrypted, account linked to phone number.
  • Telegram: Popular but often misunderstood. Regular chats are NOT end-to-end encrypted — they're encrypted in transit but Telegram can read them. "Secret chats" are end-to-end encrypted but must be manually initiated. Pros: large user base, feature-rich, good for groups. Cons: default chats aren't truly private, security model has been criticized by researchers.
  • Wickr Me: Purpose-built for ephemeral messaging. All messages are end-to-end encrypted with automatic deletion. No phone number or email required to sign up. Pros: strongest ephemeral messaging, anonymous accounts possible. Cons: small user base, owned by Amazon/AWS, less polished interface.

Messaging Hygiene

  • Enable disappearing messages on all work conversations
  • Never send explicit photos or session details via standard SMS
  • Disable cloud backup for your encrypted messaging apps (iCloud backup of WhatsApp undoes the encryption)
  • Periodically clear old conversations even in encrypted apps — encryption protects messages in transit, but a seized phone with unlocked apps exposes everything stored locally
  • Use different messaging apps for different purposes: Signal for screening conversations, WhatsApp for confirmed client logistics, Telegram for community groups

Password Managers

You have dozens of accounts — advertising platforms, email, banking, social media, VoIP services, VPN, cloud storage. If you're reusing passwords across these, a single breach exposes everything. A password manager solves this completely.

How They Work

A password manager stores all your passwords in an encrypted vault protected by one master password. It generates unique, complex passwords for every account. You remember one password; the manager handles the rest. Most auto-fill passwords in your browser and apps.

Recommended Options

  • Bitwarden: Open-source, free tier that's genuinely usable, cross-platform. Pros: trustworthy (open-source and audited), generous free tier, works everywhere. Cons: interface is functional but not elegant, auto-fill can be finicky on some mobile browsers.
  • 1Password: Polished, user-friendly, excellent cross-platform support. Travel mode can hide sensitive vaults when crossing borders. Pros: best user experience, travel mode is uniquely useful for providers, strong family/team sharing. Cons: paid only (no free tier), more expensive than alternatives.
  • KeePassXC: Offline, open-source, stores your vault locally. Pros: no cloud involvement at all (your passwords never leave your device), completely free, extremely secure. Cons: no built-in sync (you manage backups yourself), steeper learning curve, less convenient on mobile.

Critical Setup

  • Your master password must be long, unique, and something you'll never forget. A passphrase works well: four or more unrelated words strung together
  • Enable two-factor authentication on your password manager account
  • Store your master password recovery information (recovery key, emergency kit) in a physically secure location — a locked safe, a sealed envelope with a trusted person
  • Separate your work and personal passwords into different vaults or folders
  • Change passwords on your most sensitive accounts (email, banking, advertising platforms) at least every six months

Backup & Recovery Plans

What happens if your phone is stolen, destroyed, or seized? If your laptop dies? If an account gets hacked? A backup and recovery plan means these events are inconvenient rather than catastrophic.

Device Loss Protocol

  1. Immediate remote wipe: Both Apple and Google offer remote device wiping. Set this up now, before you need it. Practice the process so you can do it under stress. Know the login credentials for Find My iPhone or Google Find My Device by heart.
  2. Backup phone ready: Keep an inexpensive backup phone charged and configured with your essential apps, VoIP number, and password manager. If your primary work phone is lost, you can be operational again within minutes.
  3. Account recovery: Ensure every important account has a recovery method that doesn't depend on the lost device. Recovery email on a different device, backup codes stored securely, recovery phone number on a second device.

Data Backup

  • Client records: If you keep digital client records, back them up encrypted to a second location. A password-protected USB drive stored separately from your primary device works. Cloud backup is convenient but must be encrypted before upload.
  • Financial records: Tax documentation, income records, and expense tracking should be backed up independently from your work devices. See our tax guide for what records to maintain.
  • Photos and content: Your professional photos represent significant investment. Back up your full-resolution originals to an encrypted external drive and a separate cloud service from your daily-use accounts.

Digital Evidence Preservation

If something goes wrong — a client threatens you, a boundary is violated, someone attempts blackmail, or you experience harassment — the digital evidence you've preserved may be critical. Don't wait until you need it to learn how to save it.

What to Preserve

  • Threatening messages (screenshot with full header showing sender info and timestamps)
  • Voicemails (save the audio file, note the number and date)
  • Social media posts or messages (screenshot the full page including URL and timestamp)
  • Email headers (which contain routing information that can identify senders even with fake addresses)
  • Security camera footage from relevant timeframes
  • Any documentation of physical evidence (photos of injuries, damaged property)

How to Preserve It

  • Screenshots are the minimum: Take them immediately. Include the full screen — date, time, sender information, and the content. Take multiple screenshots if the content spans multiple screens.
  • Save original files when possible: Screenshots can be questioned. Original message files, exported chat logs, and original photos with metadata intact are stronger evidence.
  • Store evidence in multiple locations: Email it to yourself (on a personal account not connected to your work identity), save to an encrypted cloud drive, and keep a copy on a USB drive. Evidence that exists in only one place can be lost.
  • Document the context: Write a brief contemporaneous account of what happened, when, and who was involved. Memory fades and details merge. A written account created at the time of events carries weight.
  • Don't alter or edit evidence: Even cropping a screenshot can raise questions about what was removed. Preserve everything as-is.

When to Involve Professionals

If you're dealing with serious threats, stalking, blackmail, or violence, consider contacting a sex-work-friendly legal professional. Our legal guide and resources page list organizations that can connect you with appropriate legal support. Some organizations offer free or reduced-cost legal assistance specifically for sex workers dealing with safety threats.

Technology is a tool, not a solution. The most sophisticated safety setup in the world can't replace good screening, strong boundaries, and trusting your instincts. But layered technology — VoIP numbers protecting your identity, VPNs shielding your browsing, encrypted messaging securing your communications, safe call systems watching your back, and evidence preservation protecting your future — creates a safety infrastructure that makes every other aspect of your work more secure. Set it up once, maintain it regularly, and let it work in the background while you focus on your business.


Related guides: Safety Essentials · Digital OPSEC · Client Screening Guide · Dealing With Stalkers · Incall Setup Guide