Children internet safety
What tools and conversations keep my kids safe from online predators and content?
Projekt-Plan
Why: Understanding the psychological shift from a play-based to a phone-based childhood is crucial for setting effective boundaries.
How:
- Focus on the 'Four Norms': No smartphones before high school, no social media before 16, phone-free schools, and more unsupervised real-world play.
- Take notes on how these principles apply to your specific family dynamic.
- Identify the 'why' behind your new rules to explain them clearly to your children.
Done when: Key takeaways are summarized for the upcoming family meeting.
Why: Clear, written expectations prevent arguments and ensure everyone knows the consequences of breaking digital rules.
How:
- Include specific 'Tech-Free Zones' (e.g., dining table, bedrooms).
- Define 'Tech-Free Times' (e.g., one hour before bed).
- List mandatory safety behaviors, such as 'Never share your real name or location with strangers.'
- Add a 'No-Shame Clause': Promise that if they come to you with a mistake or something scary, they won't lose their device immediately.
Done when: A physical document is drafted and ready for signatures.
Why: Collaboration increases compliance; kids need to feel like partners in their safety, not just subjects of surveillance.
How:
- Present the Family Media Contract as a way to keep everyone safe, not as a punishment.
- Ask your children what they enjoy most online and what makes them feel uncomfortable.
- Explain the 'Grandma Rule': Never post anything you wouldn't want your grandmother to see.
Done when: The contract is signed by all family members and posted on the fridge.
Why: Children need a simple, actionable script for when they encounter predators or inappropriate content.
How:
- STOP: Immediately close the app or turn over the device if something feels 'weird' or scary.
- BLOCK: Show them how to use the block and report buttons on their favorite platforms.
- TELL: Emphasize that they must tell a trusted adult immediately, no matter what the stranger said.
Done when: The child can successfully demonstrate how to block a user on their most-used app.
Why: This acts as a first line of defense by blocking adult content for every device connected to your home Wi-Fi.
How:
- Access your router's admin panel (usually 192.168.1.1 or 192.168.0.1).
- Locate the DNS settings.
- Replace the existing DNS addresses with a free family-safe service like OpenDNS FamilyShield (208.67.222.123 and 208.67.220.123).
- Save and restart the router.
Done when: A test search for adult content on a Wi-Fi-connected device is blocked.
Why: Operating system controls allow you to manage screen time, approve app downloads, and track location.
How:
- For Android: Install and set up 'Google Family Link'.
- For iOS: Go to Settings > Screen Time and set up 'Family Sharing'.
- Set 'App Limits' for social media and games (e.g., 60 mins/day).
- Enable 'Ask to Buy' so no apps can be installed without your notification.
Done when: You receive a notification on your phone when the child tries to download a new app.
Why: Most online grooming and cyberbullying occur late at night in the privacy of a bedroom.
How:
- Designate a common area (like the kitchen) for all devices to be stored overnight.
- Purchase a multi-port USB charging hub to keep cables organized.
- Set a 'Digital Sunset' time (e.g., 8:00 PM) when all devices must be plugged in.
Done when: All family devices are charging in the common area by the designated time.
Why: Many apps default to sharing exact GPS coordinates, which can be used by predators to track a child's routine.
How:
- Open 'Settings' on the child's device.
- Navigate to 'Privacy' > 'Location Services'.
- Turn off 'Precise Location' for all apps except essential navigation.
- Specifically disable location for Camera, Snapchat (Ghost Mode), and Instagram.
Done when: The location settings for all non-essential apps are set to 'Never' or 'While Using' without precise tracking.
Why: Reducing the 'attack surface' by removing unnecessary or high-risk apps is the simplest way to increase safety.
How:
- Go through every app on the child's device together.
- Delete apps that allow anonymous chatting (e.g., Omegle-style clones) or have poor age ratings.
- Check for 'Vault' apps that look like calculators but hide photos/videos.
Done when: Only age-appropriate, parent-approved apps remain on the device.
Why: Online gaming lobbies are frequent sites for verbal abuse and predatory 'grooming' through voice chat.
How:
- On PlayStation/Xbox/Switch, go to 'Account Settings' > 'Privacy'.
- Set 'Communication with Others' to 'Friends Only' or 'Off'.
- Disable the ability for strangers to see the child's real name or profile details.
- Set spending limits to $0 to prevent unauthorized in-game purchases.
Done when: The console profile is set to 'Private' and voice chat is restricted.
Why: YouTube's algorithm can quickly lead children from innocent videos to disturbing or inappropriate content.
How:
- Open the YouTube app and tap the profile icon.
- Go to 'Settings' > 'General'.
- Toggle 'Restricted Mode' to ON.
- For younger children, install 'YouTube Kids' and set the content level to their specific age group.
Done when: YouTube search results filter out mature content.
Why: Technical tools can be bypassed; internal 'gut feeling' is the child's ultimate defense.
How:
- Explain 'Love Bombing': Strangers giving excessive compliments or virtual gifts (skins, currency).
- Explain 'Secrecy': Anyone asking them to 'Keep this our little secret' or 'Don't tell your parents' is a danger.
- Explain 'Isolation': Predators often try to turn kids against their parents by acting like the only ones who 'truly understand' them.
Done when: The child can identify at least two red flags of a predatory interaction.
Why: In 2025/2026, AI-generated content and voice cloning are major risks for extortion and misinformation.
How:
- Show examples of AI-generated images (use a generic AI image generator) to demonstrate that 'seeing is no longer believing.'
- Establish a 'Family Emergency Password'—a secret word used only in real emergencies to verify identity over the phone.
- Discuss why they should never send photos or videos to anyone, as these can be manipulated by AI.
Done when: A family emergency password is created and memorized.
Why: Safety is a process, not a one-time setup. Regular reviews keep the dialogue open.
How:
- Set a recurring calendar event for the first Sunday of every month.
- Use the time to review app permissions, update passwords, and talk about any new apps the child wants to try.
- Ask: 'What was the weirdest thing you saw online this month?' to keep communication casual and non-judgmental.
Done when: A recurring event is visible in the family's digital calendar.