Archive

The Dulin Report

Browsable archive from the WordPress export.

Results (44)

The future is bright Mar 30, 2025 On Amazon Prime Video’s move to a monolith May 14, 2023 Some thoughts on the latest LastPass fiasco Mar 5, 2023 Monolithic repository vs a monolith Aug 23, 2022 TypeScript is a productivity problem in and of itself Apr 20, 2022 Tools of the craft Dec 18, 2021 Should we abolish Section 230 ? Feb 1, 2021 The passwords are no longer a necessity. Let’s find a good alternative. Mar 2, 2020 All emails are free -- except they are not Feb 9, 2019 Returning security back to the user Feb 2, 2019 Microsoft acquires Citus Data Jan 26, 2019 Teleportation can corrupt your data Sep 29, 2018 A conservative version of Facebook? Aug 30, 2018 On Facebook and Twitter censorship Aug 20, 2018 Facebook is the new Microsoft Apr 14, 2018 Quick guide to Internet privacy for families Apr 7, 2018 When politics and technology intersect Mar 24, 2018 Nobody wants your app Aug 2, 2017 Emails, politics, and common sense Jan 14, 2017 Windows 10: a confession from an iOS traitor Jan 4, 2017 Collaborative work in the cloud: what I learned teaching my daughter how to code Dec 10, 2016 Don't trust your cloud service until you've read the terms Sep 27, 2016 What I learned from using Amazon Alexa for a month Sep 7, 2016 Why I switched to Android and Google Project Fi and why should you Aug 28, 2016 Amazon Alexa is eating the retailers alive Jun 22, 2016 Files and folders: apps vs documents May 26, 2016 What can we learn from the last week's salesforce.com outage ? May 15, 2016 Why it makes perfect sense for Dropbox to leave AWS May 7, 2016 Let's stop letting tools get in the way of results Apr 10, 2016 Managed IT is not the future of the cloud Apr 9, 2016 Operations costs are the Achille's heel of NoSQL Nov 23, 2015 IT departments must transform in the face of the cloud revolution Nov 9, 2015 What Every College Computer Science Freshman Should Know Aug 14, 2015 Ten Questions to Consider Before Choosing Cassandra Aug 8, 2015 Attracting STEM Graduates to Traditional Enterprise IT Jul 4, 2015 Smart IT Departments Own Their Business API and Take Ownership of Data Governance May 13, 2015 We Need a Cloud Version of Cassandra May 7, 2015 The Clarkson School Class of 2015 Commencement speech May 5, 2015 Why I am not Getting an Apple Watch For Now: Or Ever Apr 26, 2015 My Brief Affair With Android Apr 25, 2015 What can Evernote Teach Us About Enterprise App Architecture Apr 2, 2015 Microsoft and Apple Have Everything to Lose if Chromebooks Succeed Mar 31, 2015 On anti-loops Mar 13, 2014 Things I wish Apache Cassandra was better at Feb 12, 2014

Quick guide to Internet privacy for families

April 7, 2018

Over the weekend we activated an iPhone for our teenager. I decided to put this guide together for other families who might be less technologically inclined.

Picking the right device



  1. iPhones and iOS ecosystem are fundamentally more secure and private than Android.

  2. Apple doesn’t make money from tracking people. Google does.


There is no shame in using Android or letting Google track you, but make your own decisions wisely and read terms of service.

Securing passwords and identity information


Do not use the same password for different services. Make sure that you can access critical accounts in the event of an emergency.

  1. Get a 1Password Family plan and use it to generate unique passwords for each service you use. Yes, the cost is worth it.

  2. If given an option, use 1Password to create a new account — do not allow apps to authenticate you against Google or Facebook.

  3. Create two shared vaults. One for adults in the family to share passwords to critical accounts, such as banks, life insurance, utilities, etc. Create another one to share PINs and passwords with your child. When your child turns the age of majority, review the critical accounts with them as well.

  4. Just like it is a good idea to share necessary credentials for significant accounts with your spouse in the event of an emergency, explain to your child that you have no intention of violating their privacy but knowing their passwords is for emergencies only.


Secure email


Email services like Gmail are not private.

  1. Use ProtonMail for secure messaging within the family. If each family member has a ProtonMail account, you can be assured that no one else can decrypt messages. You can send bank statement to your spouse knowing that no one else can see them.

  2. Second best is Apple iCloud. Apple doesn’t make money from scanning your emails. Apple does store your messages in an unencrypted form on Apple’s servers, so bear that in mind.

  3. Do not use Gmail, Hotmail, or any other free email service that lures you in with unlimited storage and what not. Google scans your emails to track you for advertising purposes and so do other similar services. If you do use these services, assume that your emails are not secure.

  4. You can use Gmail and such for signing up for newsletters and various other spam-like mailings. For example, you can use Gmail to sign up for a store loyalty program.

  5. Use secure email, preferably Proton, to sign up for bank statements.


My preference is to have two accounts — a ProtonMail account for private, secure emails; and a Gmail account for everything else.

Separate “media” from “social”


Try to maintain a social network without the “media” part. Stay away from social networks such as Facebook and Twitter that don’t separate “social” from “media.” Luckily, teens don’t want to use either of these services and the ones they do prefer give them a lot more control (i.e., Instagram and Snapchat).

  1. Apple iMessage is end-to-end encrypted, and you can create a family group chat. If your extended family does not use Apple phones, the next best alternative is Viber.

  2. You can use Apple Photos to share photo albums, Instagram style.

  3. If you must use Instagram or Snapchat, make your account private and approve all followers. Do not connect with people you don’t know in person. Periodically review who you follow and who your followers are and prune the list.


Secure notes and documents


Remember that services like Google Keep and Evernote store your notes on their servers and they can scan them. While it is highly unlikely, a breach may result in a leak of your records. Do not store anything in plain text on the Internet that you don’t want on the front page of the New York Times one day!

  1. Do not store private information in Evernote such as social security numbers, passwords, or accounts numbers.

  2. Use 1Password to save documents and notes in an encrypted form.

  3. Services like Grammarly are popular with high school and college students, but remember – Grammarly stores your writing in plain text and scans it.


Enable location sharing


If you are using Apple devices, configure “Find My Friends” app to share your location with family members. Explain to your teen that this is not because you want to spy on her – this is for her safety so that in the event of an emergency all members of the family know where to find one another.