So far, there is a huge emphasis on threat models covering corporations or governmental agencies but not from known persons (i.e. domestic violence and cult-like environments). Technology abuse is a relatively emergent phenomenon and focuses on threat actors who already have access to a victim’s accounts.
For example, an abuser might have access to their victim’s email address and phone. With it, they could track their location with the Find My or Google timeline features. Assuming that the victim is able to physically move out, there is still a severe level of compromise that they might not be familiar with.
I imagine that these series of guides will focus mostly on hardening online accounts or identifying harmful device settings. Would all this be a fit perhaps?