What we Block and Why

A commitment to safe internet use

We constantly review apps and changes to existing apps and usage to determine what is allowed or not. We are also guided by leading eSafety and Cyber policy makers, advisors and general industry experts.

Age based

These apps, sites and functions are blocked for various age groups across device types.

Roblox

Experience the fusion of imagination and expertise with Études Architectural Solutions.

KIK

It allows strangers to chat to each other via a “meet new people” feature.

SnapChat

Identified as problematic for developing minds and noted risks of ‘disappearing messages’ creating a false sense of privacy as they can be saved/recorded.

Instagram

Identified as problematic for developing minds with algorithms designed to keep people scrolling despite content. Also known to present fake sense of reality and curated profiles leading to comparison and low self-esteem.

Messenger

Browser embedded allows linking off to Facebook Reels and YouTube.

YouTube Shorts, Instagram Reels and Facebook Reels

Doomscrolling and algorithms again designed for dopamine rather than education or real social connection.

Adult Sites

We use global providers that constantly update their databases of adult sites which are blocked. This is managed at the device level so no browser or app work around is possible.

Flagged Malware Sites

We use global providers that constantly update their databases of risky and known malware sites which are blocked. This is managed at the device level so no browser or app work around is possible.

AI

We monitor the evolution of AI and the ethics and controls in place behind the providers. AI allowed to create deepfakes for example is blocked and known ethical AIs allowed.

Javascript

An older web development language not widely used nor required. Due to its risk it is blocked for lower age groups until they develop more cyber awareness.

Autofill

Browsers that capture, store and autofill your personal data place your privacy at risk. We turn off autofill for the younger ages to avoid risk of personal information being stolen or shared accidentally.

Cookies

A general privacy risk in terms of tracking and building profiles. This again is turned off for the younger users which may prevent some websites but protects privacy.

In Private Browsing

A common work around for the tech savvy teen. In-Private browsing can bypass other apps and plugins pretty easily. We just disable the ability so young people are required to use profiles and if they log out then tougher lockdowns are defaulted until they log back in.

Flash

Another old web technology very rarely used. It is path used for malware and as such has been disabled.

Developer Tools and Mode

Another avenue for the tech savvy youth. Developer Tools and Modes in browsers and systems open up tools that allow users to bypass or change browser settings and blocks commonly put in place by schools for example. They just don’t have access with us.

Safe mode

Another method to bypass security and privacy controls for the most dedicated. Safe mode switches off a lot of layers in Windows when something is going wrong. This can allow disabling of a lot of the controls and protections provided.

USB Drives

Plugging in random USB drives or drives with viruses is still a very common exploit. These days getting files on and off, or shared is easy via the web so this vulnerability is shutoff with low impact to users.

Public WIFI

WIFI spoofing or connecting to public WIFI routers is another high risk and popular exploit for modern devices to steal data or install malware. We disable the feature for young people until they are more tech savvy on the risks.

VPNs

The newest and perhaps most common work around for pretty much all the ‘social media delays’, country-based website restrictions and general backdoor for young people to get access to places we really don’t want them to be. They can’t create or use VPNs with us.

Bluetooth Data Transfers

Less common and probably not going to be missed by most people, you can connect and transfer files via bluetooth. Like USB it just opens up another non-essential vulnerability to pick-up malware or viruses.

Tethering (USB / Bluetooth)

Not as common but still possible, tethering is like using a phone as a hotspot but it’s done via USB cable or Bluetooth. We turn this off in younger profiles so they join known WIFI networks or use 4G/5G built into the device.

Calls, MMS and SMS

In our younger profiles we find there is no need for actual phone calls, MMS and SMS. Trusted apps on the device with defined contacts are the safer way to go to avoid hoax and scam callers.

Modifying Date/Time

When using parental apps or apps that utilise date/time then being able to change it from the actual date/time can be an effective work around. Devices will update themselves based on internet clocks and mobile networks.

Stopping System Apps

Killing the apps that are protecting the users and device is another easy work around which we block.

HotSpotting / Internet Sharing

For the younger profiles we have this turned off to avoid young people picking up new devices and piggy backing them onto the safe and secure devices. It also help manage uncontrolled data use and the social pressure of sharing data with peers.

Application Installs

We start with known application lists and move up to ‘store apps only’ before unrestricted access based on age. Known application lists are curated based on age and store apps provide some freedom while keeping the protection of Store published apps.