Scenario One:
Jacob is fairly certain there’s tracking malware installed on his phone. His girlfriend keeps “running into” him while at restaurants or on errands, and she sometimes references things he’s only said in private messages or emails. He’s double-checked his location settings and apps, and things look normal. So as an experiment, he borrows a friend’s phone for the day, and leaves his at home. That night, when she asks him what he’s been up to, he observes she seems surprised and unhappy to learn he had not been at home all day.
Scenario Two:
After Thiir (they/them) breaks up with their partner, they notice they can’t access several of their streaming services and social media. They had previously logged into those accounts on the partner’s devices, while they were still together. Thiir is devastated to see embarrassing and reputation-damaging posts being made on their social media feeds, pretending to be them. Thiir's partner ignores them when they send messages pleading to delete the posts/restore login access.
Scenario Three:
Yelena going through a divorce with her husband, and the “smart” devices they have in the house keep getting turned on—the Apple TV will start blaring at 2am, the front door she locked the night before will get unlocked overnight, Alexa will make to-do tasks randomly that she didn’t ask her to. She missed an important meeting yesterday because Alexa said it was today. She tried signing into the Alexa app, but her login didn’t work. She doesn’t really know what else to do, besides unplug Alexa and the TV. Her husband was the one who set up the “smart” devices, and she has no idea how any of it works.