Archive

The Dulin Report

Browsable archive from the WordPress export.

Results (30)

On Amazon Prime Video’s move to a monolith May 14, 2023 Stop Shakespearizing Sep 16, 2022 Should we abolish Section 230 ? Feb 1, 2021 Returning security back to the user Feb 2, 2019 Facebook vastly improved their advertiser vetting process Jan 21, 2019 A conservative version of Facebook? Aug 30, 2018 On Facebook and Twitter censorship Aug 20, 2018 I downloaded my Facebook data. Nothing there surprised me. Apr 14, 2018 Facebook is the new Microsoft Apr 14, 2018 Quick guide to Internet privacy for families Apr 7, 2018 Leaving Facebook and Twitter: here are the alternatives Mar 25, 2018 When politics and technology intersect Mar 24, 2018 Architecting API ecosystems: my interview with Anthony Brovchenko of R. Culturi Jun 5, 2017 Copyright in the 21st century or how "IT Gurus of Atlanta" plagiarized my and other's articles Mar 21, 2017 Windows 10: a confession from an iOS traitor Jan 4, 2017 Don't trust your cloud service until you've read the terms Sep 27, 2016 Amazon Alexa is eating the retailers alive Jun 22, 2016 Why it makes perfect sense for Dropbox to leave AWS May 7, 2016 OAuth 2.0: the protocol at the center of the universe Jan 1, 2016 We Live in a Mobile Device Notification Hell Aug 22, 2015 What Every College Computer Science Freshman Should Know Aug 14, 2015 On Maintaining Personal Brand as a Software Engineer Aug 2, 2015 Social Media Detox Jul 11, 2015 Attracting STEM Graduates to Traditional Enterprise IT Jul 4, 2015 The Clarkson School Class of 2015 Commencement speech May 5, 2015 Why I am not Getting an Apple Watch For Now: Or Ever Apr 26, 2015 Exploration of the Software Engineering as a Profession Apr 8, 2015 What can Evernote Teach Us About Enterprise App Architecture Apr 2, 2015 Microsoft and Apple Have Everything to Lose if Chromebooks Succeed Mar 31, 2015 On Managing Stress, Multitasking and Other New Year's Resolutions Jan 1, 2015

Quick guide to Internet privacy for families

April 7, 2018

Over the weekend we activated an iPhone for our teenager. I decided to put this guide together for other families who might be less technologically inclined.

Picking the right device



  1. iPhones and iOS ecosystem are fundamentally more secure and private than Android.

  2. Apple doesn’t make money from tracking people. Google does.


There is no shame in using Android or letting Google track you, but make your own decisions wisely and read terms of service.

Securing passwords and identity information


Do not use the same password for different services. Make sure that you can access critical accounts in the event of an emergency.

  1. Get a 1Password Family plan and use it to generate unique passwords for each service you use. Yes, the cost is worth it.

  2. If given an option, use 1Password to create a new account — do not allow apps to authenticate you against Google or Facebook.

  3. Create two shared vaults. One for adults in the family to share passwords to critical accounts, such as banks, life insurance, utilities, etc. Create another one to share PINs and passwords with your child. When your child turns the age of majority, review the critical accounts with them as well.

  4. Just like it is a good idea to share necessary credentials for significant accounts with your spouse in the event of an emergency, explain to your child that you have no intention of violating their privacy but knowing their passwords is for emergencies only.


Secure email


Email services like Gmail are not private.

  1. Use ProtonMail for secure messaging within the family. If each family member has a ProtonMail account, you can be assured that no one else can decrypt messages. You can send bank statement to your spouse knowing that no one else can see them.

  2. Second best is Apple iCloud. Apple doesn’t make money from scanning your emails. Apple does store your messages in an unencrypted form on Apple’s servers, so bear that in mind.

  3. Do not use Gmail, Hotmail, or any other free email service that lures you in with unlimited storage and what not. Google scans your emails to track you for advertising purposes and so do other similar services. If you do use these services, assume that your emails are not secure.

  4. You can use Gmail and such for signing up for newsletters and various other spam-like mailings. For example, you can use Gmail to sign up for a store loyalty program.

  5. Use secure email, preferably Proton, to sign up for bank statements.


My preference is to have two accounts — a ProtonMail account for private, secure emails; and a Gmail account for everything else.

Separate “media” from “social”


Try to maintain a social network without the “media” part. Stay away from social networks such as Facebook and Twitter that don’t separate “social” from “media.” Luckily, teens don’t want to use either of these services and the ones they do prefer give them a lot more control (i.e., Instagram and Snapchat).

  1. Apple iMessage is end-to-end encrypted, and you can create a family group chat. If your extended family does not use Apple phones, the next best alternative is Viber.

  2. You can use Apple Photos to share photo albums, Instagram style.

  3. If you must use Instagram or Snapchat, make your account private and approve all followers. Do not connect with people you don’t know in person. Periodically review who you follow and who your followers are and prune the list.


Secure notes and documents


Remember that services like Google Keep and Evernote store your notes on their servers and they can scan them. While it is highly unlikely, a breach may result in a leak of your records. Do not store anything in plain text on the Internet that you don’t want on the front page of the New York Times one day!

  1. Do not store private information in Evernote such as social security numbers, passwords, or accounts numbers.

  2. Use 1Password to save documents and notes in an encrypted form.

  3. Services like Grammarly are popular with high school and college students, but remember – Grammarly stores your writing in plain text and scans it.


Enable location sharing


If you are using Apple devices, configure “Find My Friends” app to share your location with family members. Explain to your teen that this is not because you want to spy on her – this is for her safety so that in the event of an emergency all members of the family know where to find one another.