Personal security

Private security advisory for high-profile individuals

Discreet cyber security advisory for high-profile individuals at elevated risk. Defence industry expertise in digital privacy, operational security, and anonymity.

Security services

Personalised protection for individuals who face elevated and targeted risk.

Personal risk assessment

A confidential evaluation of your personal threat landscape—who might target you, how, and through which channels.

Digital privacy & anonymity

Systematic reduction of your online exposure. We identify what personal information is publicly accessible and work to remove, minimise, or anonymise it.

Device & communication security

Securing the hardware and channels you depend on daily. We assess and harden your devices, configure encrypted communications, and establish secure practices for sensitive conversations.

Operational security training

Understanding and applying OPSEC principles in everyday life. We provide personalised coaching on situational awareness, information discipline, social media hygiene, and how to avoid inadvertently revealing sensitive information.

Incident response & crisis support

Rapid support when you face an active threat—doxxing, targeted harassment, account takeover, or a suspected breach.

Ongoing security advisory

A continuous security partnership for individuals requiring sustained protection.

Why trust us

Combining defence industry experience with deep knowledge of personal security, privacy, and anonymity.

  • Extensive background in defence industry security, working in highly classified and sensitive environments
  • Practical experience with operational security doctrine from classified environments
  • Deep expertise in privacy tools, anonymisation techniques, and digital footprint reduction
  • Trained in advanced threat detection and adversary tactics (GIAC GDAT, SpecterOps)
  • Trusted network of physical security partners, available when a risk assessment identifies needs that extend beyond the digital.
  • Discreet, confidential engagements—we understand the sensitivity of this work
  • Technical depth combined with practical, actionable guidance

Discreet, personalised, and thorough

We treat every client as a unique individual with a distinct threat profile and lifestyle.

  • Confidential assessment of your specific threat landscape
  • Risk-tiered recommendations—no unnecessary complexity
  • Cyber security is our core—digital privacy, OPSEC, and device hardening
  • Practical tools and habits over theoretical frameworks
  • Defence-grade OPSEC principles applied personally
  • Ongoing adaptation as your situation and threats evolve
  • Discreet engagement—our involvement is itself protected

Frequently Asked Questions

Who is this service for?

This service is designed for individuals with elevated personal risk profiles: executives, public figures, politicians, journalists, high-net-worth individuals, celebrities, and anyone who has become—or fears becoming—a target of surveillance, harassment, or targeted attacks. If you have significant online exposure, a public profile, or possess sensitive information that others might want to access, you are likely a candidate.

Is this different from your corporate cyber security offering?

Yes. Corporate security focuses on organisational infrastructure and systems. Personal security addresses the individual—your personal devices, accounts, communications, online footprint, and daily habits. The threat actors targeting individuals (stalkers, political opponents, competitors, criminals) differ from those targeting organisations, and so do the appropriate countermeasures. Personal security also requires a higher level of discretion and personalisation.

How confidential are your engagements?

Completely. We treat all client information with maximum discretion. We do not discuss client relationships or disclose who we work with. The nature of our work requires absolute confidentiality—we apply the same information discipline to our client relationships that we teach to our clients.

What does an engagement typically look like?

We start with a confidential consultation to understand your situation, concerns, and lifestyle. Based on this, we conduct a risk assessment and present a prioritised set of recommendations. Implementation can be phased—starting with high-impact, low-effort improvements—or comprehensive. Ongoing retainer arrangements are available for those who need continuous support and monitoring.

Do I need technical knowledge?

No. We translate complex security concepts into practical, understandable guidance. Our goal is to make security accessible without compromising effectiveness. We help you select and configure the right tools and establish sustainable habits—not to overwhelm you with jargon or require constant technical intervention on your part.

Can you help if I am already facing a threat?

Yes. If you are currently experiencing targeted harassment, have reason to believe you are under surveillance, or have had accounts or data compromised, please reach out immediately. We provide crisis response and can prioritise urgent situations. Swift, discreet action is often critical in these situations.

Do you cover physical security as well?

Our core expertise is cyber security—protecting your digital life, devices, communications, and online presence. Where a risk assessment surfaces a physical dimension, we can connect you with vetted professionals, but this is the exception rather than the rule.

Protect what matters

Your privacy and security are not one-size-fits-all. Let's have a confidential conversation about your situation.

Get in touch

Choose your preferred contact method

Send email

Standard email to our team

Open email client

Encrypted email

For sensitive communications, use our PGP public key to encrypt your message

Download key file
How to use PGP encryption

PGP (Pretty Good Privacy) encrypts your email so only the intended recipient can read it. This is recommended for sensitive business communications.

  1. Install a PGP-capable email client (Thunderbird with Enigmail, Apple Mail with GPG Suite, or Outlook with Gpg4win)
  2. Import our public key using the download or copy button
  3. Compose your email to info@sharedjourney.se
  4. Select our key for encryption before sending