▶ Watch or Listen to this Article
Prefer to watch or listen? Click play to check out the video version of this article.
I've watched people lose everything - not their house, not their car, not the physical things we typically worry about - I mean their entire digital existence. Their email, bank access. Their social media history. Their photos. Years of carefully built online relationships and accounts, all compromised by someone who used to know their passwords - or worse, who never needed to guess because the accounts were just sitting there, wide open.
And here's the part that makes me genuinely angry: almost every single one of these disasters could have been prevented with a simple, free tool that most people skip because 'it's kind of annoying.'
Multi-factor authentication. MFA. Two-factor authentication. 2FA. Whatever you want to call it.
It adds an extra step when you log in. Sometimes the code expires before you can type it in and you have to request another one. It's not perfectly seamless. But you know what else isn't seamless? Rebuilding your entire digital identity from scratch because your ex decided to weaponize your old login credentials against you.
Real People, Real Consequences
This isn't hypothetical. One Iowa man described how his ex-wife accessed his online accounts without permission and then used what she found to threaten him - showing private information to his new girlfriend and holding it over his head anytime he tried to assert himself in any way. He was posting from an alternate account because she knew his main one. Read that again slowly. He was hiding on his own Reddit account, in his own life, because someone had access to digital spaces he thought were private. [1]
The Morrow Law Firm, which handles Florida divorce cases involving digital intrusion, notes that cyber-hacking has become a genuinely common tactic during divorce proceedings - people accessing emails, social media, cloud storage, even GPS data from smartphones to gain leverage in negotiations or simply to maintain control over a former partner. Under Florida law, this is a felony. Under federal law, it potentially violates the Wiretap Act. Doesn't matter. People do it anyway, because the opportunity is there and the technical barrier is essentially zero when someone has been sharing your login credentials for years. [2]
The Quora threads on this topic are almost to read - people discovering their exes have been inside their bank accounts, with strangers in the comments sharing their own versions of the same nightmare.
And then there's Leon Walker of Michigan, who in 2010 faced up to five years in prison for logging into his wife's Gmail account using a password she'd written down in a book next to the shared home computer. He believed it was acceptable. Oakland County prosecutors thoroughly disagreed, charging him with felony misuse of a computer. [4] The point here isn't about who was right or wrong in that case - it's that digital access, once given, is extraordinarily hard to fully take back without the right protections in place.
The point here isn't about who was right or wrong in that case - it's that digital access, once given, is extraordinarily hard to fully take back without the right protections in place.
Why This Gets So Messy
The specific horror of account compromise during or after a relationship ending is that it snowballs in ways that are genuinely hard to describe until you've seen it happen. Someone gets into your email. From your email, they request password resets on your other accounts. From those accounts, they access your financial information, your private messages, your photos. Suddenly you're not dealing with one compromised account - you're dealing with a cascading collapse of your entire digital life.
And here's where people really suffer: restoring account access after someone else has gotten in and potentially changed recovery options is a bureaucratic nightmare that can take weeks or months. Some platforms are better than others at helping. Many are not. I've seen people ultimately decide it's easier to create entirely new accounts - new email addresses, new social profiles, new everything - than to fight for the old ones. That's not a small inconvenience. That's a genuine loss of years of digital history, professional contacts, and personal memories.
All because there was no second layer of protection requiring something only you physically possess.
What MFA Actually Does
Multi-factor authentication works on a simple principle. Even if someone knows your password - your ex, a hacker, whoever - they still can't get into your account without a second verification, usually a time-sensitive code sent to your phone or generated by an authenticator app. No phone access, no entry. It is genuinely that straightforward.
Setting it up takes between five and fifteen minutes per account, depending on the platform. Here are the tools worth knowing:
MFA Tools Worth Using
- Google Authenticator - Free, works offline, and generates six-digit codes that refresh every thirty seconds. Works with hundreds of services - Gmail, Facebook, banking apps, Amazon, you name it. Simple interface, reliable.
- Authy (by Twilio) - Does everything Google Authenticator does but also backs up your tokens to the cloud and lets you use it across multiple devices. If you lose your phone, you're not completely locked out of your own life. This is a meaningful advantage.
- Microsoft Authenticator - Integrates beautifully with Microsoft accounts but handles non-Microsoft accounts just as well. Worth considering if you're already embedded in the Microsoft ecosystem.
- YubiKey (hardware key) - The gold standard for people who really want belt-and-suspenders security. It's a physical USB or NFC device - you can't log in without physically having it present. More setup friction, much higher security ceiling.
Stay in the Loop
Get notified when we add new tools and features
Thank You!
You're all set. We'll keep you updated with the latest tools and features.
For most regular people, Authy or Google Authenticator is the right answer. Pick one, spend an afternoon enabling MFA on every account you care about, and move on.
Being Proactive Before Things Go Sideways
If you're reading this in a stable, happy life - wonderful. Set up MFA anyway, right now, today, before you need it.
But if you're navigating a difficult relationship transition - a divorce, a serious breakup, a friendship that's turned toxic or even threatening - move this up your priority list immediately. The Morrow Law Firm's guidance on protecting yourself during divorce includes enabling two-factor authentication on all accounts as a core recommendation alongside password changes and account monitoring - not as a bonus suggestion, but as a fundamental protective step.
Here's your immediate action checklist if you're in that situation right now:
- Change every password to something strong and unique that the other person would never guess.
- Enable MFA on every account, starting with email - because email is the master key to everything else.
- Check your account recovery options and remove any phone numbers or backup emails that belong to someone who shouldn't have access.
- Check whether any third-party apps have been granted access to your accounts and revoke anything unfamiliar.
- Regularly monitor your accounts for any suspicious login activity.
- Consult with an attorney if you suspect active account intrusion - this is a legal matter, not just a technical one.
Do not wait for something bad to happen to take this seriously. The people who wish they had set up MFA are not the ones who set it up and found it mildly annoying. They're the ones who didn't, and paid a price that was completely avoidable.
The Legal Reality
It's worth being direct about something: unauthorized access to someone's accounts is a crime. It doesn't matter if you were married. It doesn't matter if you used to share the password. The Computer Fraud and Abuse Act at the federal level, plus state laws in virtually every jurisdiction, treat unauthorized digital access as a serious offense that can result in felony charges, civil lawsuits, and prison time.
And critically - evidence obtained through that illegal access is generally inadmissible in court, and attempting to use it can actually damage the legal standing of the person who obtained it. So the people who think they're being clever by snooping through an ex's accounts to "find evidence" are often handing their opponent a legal advantage while exposing themselves to criminal liability.
None of that undoes the damage to the person whose privacy was violated, which is exactly why prevention matters so much.
The Bottom Line
The extra ten seconds per login is not the horror story. The horror story is everything that comes after you didn't take those ten seconds.
Set up MFA today. On your email first. Then your banking apps. Then everything else. It's mildly inconvenient in the best of times, and genuinely life-saving in the worst of them.







