With AI, Organized Crime, pedophiles and extortions
worldwide can easily fool and harm our children. Freedom13 will do free local
meetings or Zoom presentations on the dangers and how to make children safer.
Email us at ContactUs@Freedom13.org
if you are interested. We now recommend:
No tablet or phone for toddlers. The brain develops
differently when children use tablets/phones than when they use paper books.
Use the TV so you can actually see and hear what they are watching.
Use a Gabb wireless phone (or equivalent) with no
Internet access until your child is well into the teen years. Kids can
take photos, call, and text, but can't send photos by text. It is a well-thought-out
way to sidestep most dangers completely. Parents decide when to allow their
children to use the Internet.
For teens who already have Internet access, we
recommend cancelling just the "data" portion of their cell phone
plan. They can only access the Internet by WiFi, which limits their time on social
media. Then, collecting phones at dinner and charging in the parents' bedroom
further limits screen time. We urge teens to just text, never private
message. All kinds of criminals fake everything on social media, but they will
not text because it identifies who they are and where they are.
Teens can now defeat most parental apps or have a secret second
phone. We favor the Bark Android phone. It is the hardest to defeat, and it
works with the Bark Home WiFi router. We recommend the whole family use the
same group restrictions on WiFi.
Ways tech-savvy teens get around the best parental controls:
A.
Get a second secret phone, with or
without a cell plan. Counter by not allowing your teen to have those USB
chargers. Only parents can charge devices in their bedroom. The second phone's
battery will run out, making it useless. Ask schools not to allow children to
charge phones.
B.
Have social media accounts that parents follow,
as well as fake accounts, called finstas, that parents are unaware of. Counter
by using photos from known accounts to do Google photo searches, looking for fake
accounts with the same images. Here is how.
C.
Use the library, a friend's home computer,
or borrow a friend's phone. Get to know your child's friends and parents. Encourage
friends to come to your house instead. Encourage libraries to have teen
computers with heavy controls and limit teen access to adult-only computers.
D.
Finally, a Bark Android phone will track
their emails, texts, and posts on that phone. If they slip and refer to
something dangerous they are doing on another device, it will flag parents.