Beizi Li – Human Rights Archive

李贝子|人权档案馆

Documenting systemic persecution, psychiatric abuse, and child separation —
preserving truth against institutional silence.

Z Series

ANNEX Z-9

Digital Tracking and Privacy Attacks

数字追踪与隐私攻击

中文版

本页用于记录和说明我在长期案件过程中所遭遇的数字追踪、隐私暴露、账户风险、信息路径暴露以及与此相关的持续性数字攻击问题。

与 Z-8 所强调的“数字监控与隐蔽侵入”不同,本页更集中讨论:当一个人的线上行为、设备使用、账号活动、通信习惯、网页访问与材料整理路径被持续跟踪时,这种追踪如何构成对隐私、自由和安全感的系统性侵害。

因此,本页的重点不是抽象讨论网络时代人人都会遇到的隐私问题,而是说明:在一个高风险、长期对抗性的案件背景下,数字追踪本身如何成为施压、预判、干扰与削弱个体的重要方式。

一、本页关注的核心问题

本页主要关注以下几类问题:

  • 个人账户、设备、网站与平台行为是否被持续追踪;
  • 私人通信、证据整理、备份路径与公开节奏是否存在被外部掌握的风险;
  • 个人隐私边界是否在数字环境中被不断侵蚀;
  • 数字追踪是否与现实中的权力施压、案件推进或机构动作形成联动;
  • 个体是否因此被迫改变表达方式、行动策略与安全结构。

换句话说,本页所讨论的不是一次性的技术异常,而是一种持续性的数字围困感:你不知道谁在看、看到多少、是否已经提前掌握你的材料与行动节奏,但你必须在这种不确定中继续生存和应对。

二、数字追踪为何构成独立伤害

很多人会认为,只要没有明显删改、没有直接损毁、没有公开泄露,就不算严重问题。

但数字追踪本身就已经构成独立伤害,因为它会造成:

  • 对私人空间与通信自由的破坏;
  • 对日常表达与申诉行动的寒蝉效应;
  • 对个人判断“哪里还安全”的能力的持续侵蚀;
  • 让对方可能在你公开前就预判你的动作;
  • 迫使你在准备申诉、整理证据、联系外部时始终处于防御姿态。

因此,追踪不只是“看到你做什么”,而是通过持续可见性,改变你原本可以自由行动的空间。

三、数字追踪的主要表现方向
1. 行为路径被观察

当一个人的登录、上传、备份、发文、修改页面、联系外部或整理材料的节奏被掌握时,数字空间就不再只是工具,而变成暴露行动路径的通道。行为路径一旦被看见,个体的主动性就会被削弱。

2. 隐私边界被不断压缩

隐私攻击并不一定总以“信息被公开”这种极端形式出现。更常见的情况是:个人不知道哪些内容已经暴露、哪些账户存在风险、哪些通信仍然安全。正是这种边界不确定,构成了长期压力。

3. 关键材料与敏感节点被提前识别

如果对方能够在我公开、投诉、提交、备份或发布之前,就大致掌握我的重点材料和行动方向,那么这会直接削弱我在时间上的主动权,也会增加证据被阻断、被稀释或被提前应对的风险。

4. 追踪与其他数字异常共同形成模式

数字追踪通常不是孤立存在。它往往与设备异常、账号异常、页面变动、通信不稳定、隐蔽侵入风险等问题一起出现。单看每个现象都可能显得不足够,但合在一起,就形成了持续的压迫模式。

四、隐私攻击的真实后果

隐私攻击并不一定立刻表现为巨大灾难,但它会在日常中持续制造影响:

  • 我需要不断改变密码、备份方式和联系路径;
  • 我必须反复确认材料是否还安全、是否还完整;
  • 我需要怀疑哪些内容可能已经被提前看到;
  • 我会被迫压缩正常交流与准备工作的自由度;
  • 我在长期状态中承受“永远可能被盯着”的心理压力。

这种后果看似不如实体暴力那样明显,但它的作用是持续的,会不断削弱一个人的安全感、专注力与行动效率。

五、为什么“没有完整证明”不能否定追踪现实

数字追踪最困难的地方,在于它通常不会自己提交完整证据。它往往表现为:

  • 大量零散的不对劲;
  • 时间点上反复可疑的对应;
  • 隐私边界越来越难以确认;
  • 个人不得不以防御姿态解释一连串小异常。

正因为如此,本页的重要性不在于声称每个细节都已被完全证明,而在于把这些异常整理为一个清晰的模式:当追踪、隐私攻击与案件压力长期并存时,它们就不应再被轻易拆散成互不相关的小故障。

六、本页与 Z-8 的区别

Z-8 主要关注数字监控、隐蔽侵入与异常环境本身;

Z-9 则更进一步,强调这些异常如何具体表现为:

  • 对个人数字行为的持续追踪;
  • 对隐私边界的持续攻击;
  • 对公开行动和材料处理节奏的提前掌握;
  • 把个体长期推入“不得不防”的生存状态。

也就是说,Z-8 更偏向监控与渗透,Z-9 更偏向追踪与隐私压迫。

七、本页的作用

本页在 Z 系列中的作用,是把数字追踪与隐私攻击明确列为一种独立的压制形态。

  • 它说明数字空间的风险不仅在于材料被删改;
  • 也在于个人会持续处于被观察、被预判、被迫自我收缩的环境;
  • 它为后续整理时间线、账号异常、平台风险和隐私边界受损问题提供统一入口;
  • 它也解释了为什么我必须采取跨平台存证和持续防御措施。

本页的核心结论是:数字追踪与隐私攻击并不是边缘性的技术麻烦,而是在长期高压案件中,对个体自由、隐私、主动权和行动能力进行持续削弱的重要方式。

English Version

This page records and explains the issues of digital tracking, privacy exposure, account risk, information-path visibility, and related continuing digital attacks that arose during the long course of my case.

Unlike Z-8, which focuses more broadly on digital surveillance and covert intrusion, this page concentrates on how the continuous tracking of a person’s online behaviour, device usage, account activity, communication habits, website access, and evidence-handling routines becomes a systematic attack on privacy, freedom, and security.

For this reason, the purpose of this page is not to discuss ordinary privacy concerns faced by everyone online. It is to show how, in a high-risk and adversarial case environment, digital tracking itself can become a tool of pressure, anticipation, interference, and weakening of the individual.

1. Core issues addressed on this page

This page focuses primarily on the following concerns:

  • whether personal accounts, devices, websites, and platform behaviour were continuously tracked;
  • whether private communications, evidence organisation, backup paths, and disclosure timing were vulnerable to outside knowledge;
  • whether personal privacy boundaries were repeatedly eroded within the digital environment;
  • whether digital tracking corresponded with real-world pressure, case developments, or institutional action;
  • whether the individual was forced to alter expression, strategy, and security structure as a result.

In other words, this page is not about a single technical irregularity. It is about a continuing condition of digital encirclement: not knowing who is watching, how much they know, or whether they already understand your materials and timing, yet being forced to continue living and acting within that uncertainty.

2. Why digital tracking is an independent form of harm

Many people assume that unless there is obvious deletion, direct damage, or public exposure, the problem is not serious.

But digital tracking is itself an independent form of harm because it produces:

  • the destruction of private space and communication freedom;
  • a chilling effect on ordinary expression and complaint activity;
  • a continual erosion of the ability to judge what is still safe;
  • the possibility that others may anticipate one’s actions before disclosure occurs;
  • the need to remain permanently defensive while preparing complaints, preserving evidence, and contacting outsiders.

Tracking is therefore not merely about seeing what someone does. It changes the space in which a person would otherwise be able to act freely.

3. Main forms of digital tracking
1. Observation of behavioural paths

When a person’s rhythm of logging in, uploading, backing up, posting, editing pages, contacting outsiders, or organising materials becomes visible to others, digital space no longer functions simply as a tool. It becomes a channel through which action-paths are exposed. Once those paths are visible, personal initiative is weakened.

2. Ongoing compression of privacy boundaries

Privacy attacks do not always take the extreme form of public disclosure. More often, the person simply no longer knows what has already been exposed, which accounts remain safe, or which communications can still be trusted. That uncertainty itself is a long-term burden.

3. Early identification of key materials and sensitive stages

If others can broadly identify my core materials and strategic direction before I publicly disclose, submit, back up, or publish them, that directly weakens my control over timing and increases the risk that evidence will be blocked, diluted, or countered in advance.

4. Tracking combines with other digital irregularities to form a pattern

Digital tracking rarely exists alone. It often appears together with device anomalies, account irregularities, page changes, unstable communications, or covert intrusion risks. Each incident may look insufficient on its own, but together they form a continuous pattern of pressure.

4. Real consequences of privacy attacks

Privacy attacks do not always present as immediate disaster, but they create ongoing practical effects:

  • I must repeatedly change passwords, backup methods, and contact routes;
  • I must continually verify whether materials are still safe and intact;
  • I must assume that some content may already have been seen in advance;
  • I am forced to reduce the freedom of ordinary communication and preparation;
  • I endure the long-term mental pressure of always possibly being watched.

These consequences may appear less visible than physical violence, but they operate continuously and steadily erode security, concentration, and practical effectiveness.

5. Why the lack of perfect proof does not erase the reality of tracking

The hardest aspect of digital tracking is that it rarely delivers its own complete proof. It often appears through:

  • many scattered irregularities;
  • repeatedly suspicious timing correspondences;
  • privacy boundaries becoming harder and harder to define;
  • the individual being forced to explain a long chain of small anomalies from a defensive position.

For that reason, the importance of this page does not depend on claiming that every detail has already been perfectly proven. Its importance lies in organising these anomalies into a clear pattern: when tracking, privacy attack, and case-related pressure coexist over long periods, they should no longer be dismissed as unrelated minor faults.

6. Difference between this page and Z-8

Z-8 focuses more on digital surveillance, covert intrusion, and abnormal digital conditions themselves.

Z-9 moves one step further by showing how those abnormalities specifically become:

  • continuous tracking of personal digital behaviour;
  • continuous attack on privacy boundaries;
  • advance knowledge of disclosure timing and evidence-handling patterns;
  • a condition in which the individual is forced into long-term defensive existence.

In that sense, Z-8 is more about surveillance and infiltration, while Z-9 is more about tracking and privacy-based pressure.

7. Function of this page

The role of this page within the Z series is to establish digital tracking and privacy attacks as an independent form of suppression.

  • It shows that digital risk is not limited to the deletion or alteration of evidence;
  • it also lies in pushing the individual into a condition of being watched, anticipated, and forced to shrink her own space of action;
  • it provides a single entry point for later work on timelines, account irregularities, platform risks, and damaged privacy boundaries;
  • it also explains why cross-platform evidence preservation and ongoing defence measures became necessary.

The core conclusion of this page is that digital tracking and privacy attacks are not marginal technical inconveniences. In a long-term high-pressure case, they become a major method for continuously weakening the individual’s freedom, privacy, initiative, and capacity to act.

滚动至顶部