Awareness

This service helps understand how an attack worked, without blame, with a specific focus on social networks (Facebook, Instagram, TikTok, WhatsApp, Telegram, Snapchat, X/Twitter, LinkedIn, etc.) and on information exchange via chat. It is designed for all types of users, including teenagers, in clear language adapted to knowledge level and personal experience. The approach is based on a documented methodology, with cited sources and a reconstructed timeline, set within Swiss legislation (nFADP) and OSINT principles.

What this service can offer

  • Clearly explain how a social network attack worked: phishing via DM, fake profile, uncertain identity, romance scam on social networks, shared malicious links, social engineering via chat.
  • Analyse information exchange via chat: messages, sensitive photos, videos, documents, links, addresses, shared personal data, and the consequences of that exchange.
  • Understand the psychological and technical mechanisms used in the social environment and in chats, without blaming the victim.
  • Identify typical warning signs on social networks and chats: new account, stolen photos, vague biography, money request, emotional pressure, suspicious links, requests for sensitive photos or personal material.
  • Analyse conversations, private messages, comments, shared links, friend requests and the exchange of sensitive photos, to learn from them.
  • Adapt language and examples to the user's profile (teenager, adult, senior, parent, teacher, professional).
  • Reconstruct a timeline of events on social networks and chats (messages, requests, clicked links, photos sent, actions taken) to visualise the attack progression.
  • Provide practical, realistic advice to protect social accounts, better manage information exchange via chat and better recognise future scams.
  • Document explanations with consultable sources and a respectful tone.

What the service cannot guarantee

  • That a social or chat attack will never happen again, even with the best precautions.
  • Erasure of consequences already suffered (loss of money, data, access, image, dissemination of sensitive photos).
  • Replacement of a judicial, police or banking procedure.
  • Searching for, identifying or acting against the attacker outside open social-network sources and the written mandate.
  • Total anonymity or 100% protection on every social platform and chat app.
  • Blaming, judging or labelling the victim as "responsible" for the attack or for the information exchange.

Process applied

1

Collection of context and facts as told by the user, without judgement, focused on social networks and information exchange via chat.

2

Reconstruction of the timeline of events on social networks and in chats (messages, requests, links, photos sent, actions).

3

Analysis of the attack stages on social networks and in chats: bait, deception, emotional pressure, request for sensitive photos, required action.

4

Clear explanation of the mechanisms used on social networks and in chats, adapted to the user's level (including teenagers).

5

Identification of typical warning signs on social networks and chats and tipping points.

6

Definition of practical, realistic advice to protect social accounts, better manage information exchange via chat and reduce future risks.

7

Written documented synthesis with cited sources, respectful tone, without blame and with focus on social networks and information exchange via chat.