Archive

The Dulin Report

Browsable archive from the WordPress export.

Results (37)

Strategic activity mapping for software architects May 25, 2025 The future is bright Mar 30, 2025 2024 Reflections Dec 31, 2024 The day I became an architect Sep 11, 2024 Are developer jobs truly in decline? Jun 29, 2024 Should today’s developers worry about AI code generators taking their jobs? Dec 11, 2022 Automation and coding tools for pet projects on the Apple hardware May 28, 2022 Good idea fairy strikes when you least expect it May 2, 2022 Best practices for building a microservice architecture Apr 25, 2022 Tools of the craft Dec 18, 2021 Configuring Peloton Apple Health integration Feb 16, 2019 Using Markov Chain Generator to create Donald Trump's state of union speech Jan 20, 2019 The religion of JavaScript Nov 26, 2018 Teleportation can corrupt your data Sep 29, 2018 Quick guide to Internet privacy for families Apr 7, 2018 Leaving Facebook and Twitter: here are the alternatives Mar 25, 2018 When politics and technology intersect Mar 24, 2018 Node.js is a perfect enterprise application platform Jul 30, 2017 The technology publishing industry needs to transform in order to survive Jun 30, 2017 Emails, politics, and common sense Jan 14, 2017 Windows 10: a confession from an iOS traitor Jan 4, 2017 Don't trust your cloud service until you've read the terms Sep 27, 2016 I am addicted to Medium, and I am tempted to move my entire blog to it Sep 9, 2016 What I learned from using Amazon Alexa for a month Sep 7, 2016 Amazon Alexa is eating the retailers alive Jun 22, 2016 In Support Of Gary Johnson Jun 13, 2016 What can we learn from the last week's salesforce.com outage ? May 15, 2016 Let's stop letting tools get in the way of results Apr 10, 2016 In memory of Ed Yourdon Jan 23, 2016 OAuth 2.0: the protocol at the center of the universe Jan 1, 2016 What Every College Computer Science Freshman Should Know Aug 14, 2015 On Maintaining Personal Brand as a Software Engineer Aug 2, 2015 The Three Myths About JavaScript Simplicity Jul 10, 2015 The longer the chain of responsibility the less likely there is anyone in the hierarchy who can actually accept it Jun 7, 2015 Ordered Sets and Logs in Cassandra vs SQL Apr 8, 2015 Have computers become too complicated for teaching ? Jan 1, 2013 Best way to start writing an XSLT Jun 25, 2006

Quick guide to Internet privacy for families

April 7, 2018

Over the weekend we activated an iPhone for our teenager. I decided to put this guide together for other families who might be less technologically inclined.

Picking the right device



  1. iPhones and iOS ecosystem are fundamentally more secure and private than Android.

  2. Apple doesn’t make money from tracking people. Google does.


There is no shame in using Android or letting Google track you, but make your own decisions wisely and read terms of service.

Securing passwords and identity information


Do not use the same password for different services. Make sure that you can access critical accounts in the event of an emergency.

  1. Get a 1Password Family plan and use it to generate unique passwords for each service you use. Yes, the cost is worth it.

  2. If given an option, use 1Password to create a new account — do not allow apps to authenticate you against Google or Facebook.

  3. Create two shared vaults. One for adults in the family to share passwords to critical accounts, such as banks, life insurance, utilities, etc. Create another one to share PINs and passwords with your child. When your child turns the age of majority, review the critical accounts with them as well.

  4. Just like it is a good idea to share necessary credentials for significant accounts with your spouse in the event of an emergency, explain to your child that you have no intention of violating their privacy but knowing their passwords is for emergencies only.


Secure email


Email services like Gmail are not private.

  1. Use ProtonMail for secure messaging within the family. If each family member has a ProtonMail account, you can be assured that no one else can decrypt messages. You can send bank statement to your spouse knowing that no one else can see them.

  2. Second best is Apple iCloud. Apple doesn’t make money from scanning your emails. Apple does store your messages in an unencrypted form on Apple’s servers, so bear that in mind.

  3. Do not use Gmail, Hotmail, or any other free email service that lures you in with unlimited storage and what not. Google scans your emails to track you for advertising purposes and so do other similar services. If you do use these services, assume that your emails are not secure.

  4. You can use Gmail and such for signing up for newsletters and various other spam-like mailings. For example, you can use Gmail to sign up for a store loyalty program.

  5. Use secure email, preferably Proton, to sign up for bank statements.


My preference is to have two accounts — a ProtonMail account for private, secure emails; and a Gmail account for everything else.

Separate “media” from “social”


Try to maintain a social network without the “media” part. Stay away from social networks such as Facebook and Twitter that don’t separate “social” from “media.” Luckily, teens don’t want to use either of these services and the ones they do prefer give them a lot more control (i.e., Instagram and Snapchat).

  1. Apple iMessage is end-to-end encrypted, and you can create a family group chat. If your extended family does not use Apple phones, the next best alternative is Viber.

  2. You can use Apple Photos to share photo albums, Instagram style.

  3. If you must use Instagram or Snapchat, make your account private and approve all followers. Do not connect with people you don’t know in person. Periodically review who you follow and who your followers are and prune the list.


Secure notes and documents


Remember that services like Google Keep and Evernote store your notes on their servers and they can scan them. While it is highly unlikely, a breach may result in a leak of your records. Do not store anything in plain text on the Internet that you don’t want on the front page of the New York Times one day!

  1. Do not store private information in Evernote such as social security numbers, passwords, or accounts numbers.

  2. Use 1Password to save documents and notes in an encrypted form.

  3. Services like Grammarly are popular with high school and college students, but remember – Grammarly stores your writing in plain text and scans it.


Enable location sharing


If you are using Apple devices, configure “Find My Friends” app to share your location with family members. Explain to your teen that this is not because you want to spy on her – this is for her safety so that in the event of an emergency all members of the family know where to find one another.