{"id":25321,"date":"2014-05-14T08:41:38","date_gmt":"2014-05-14T15:41:38","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=25321"},"modified":"2025-10-27T00:23:21","modified_gmt":"2025-10-27T07:23:21","slug":"parental-concerns-in-the-digital-era-exposing-personal-information","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-exposing-personal-information\/","title":{"rendered":"Exposing Personal Information: Pirated Software and Password Sharing"},"content":{"rendered":"<address><em>This is the third installment in our Five Minute Family Protection Tips series on Internet safety for concerned parents in the digital era. In <a title=\"Parental Concerns in the Digital Era: An Introduction\" href=\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era\/\" target=\"_blank\" rel=\"noopener\">part 1<\/a>, we outlined why parents should be concerned with their children&#8217;s online activities and some initial advice about online predators. In <a title=\"Parental Concerns in the Digital Era: Inappropriate Communications\" href=\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-inappropriate-communications-and-digital-harassment\/\" target=\"_blank\" rel=\"noopener\">part 2<\/a>, we examined the risks of inappropriate communications and how to cope with digital harassment.\u00a0<\/em><\/address>\n<p>Inspiration for today&#8217;s bite sized musing stems from the mysterious dangers of free cheese. We&#8217;ll get to that in just a moment, as we continue our series with some best practices that should apply to everyone in the family, not just children.<\/p>\n<h3>Illegal File Sharing: Exposing Your Information<\/h3>\n<p>Hopping onto the Internet without diligence can expose families and their files to a variety of potential threats. From inappropriate content and malicious people, to viruses, malware and network attacks, there are a number of risks that threaten a family&#8217;s online experience and can expose personal information to the bad guys.<\/p>\n<p>Alas, there is always free cheese in the mousetrap\u2014one way to reveal the contents of a family\u2019s computer to others is by downloading pirated software from peer-to-peer sites (e.g. BitTorrent).\u00a0Most people don\u2019t realize that by using peer-to-peer sites, they are inadvertently exposing their information to everyone else who uses the site.<\/p>\n<p>Installing pirated software, also known officially by the rather nerdy name of\u00a0<a title=\"&quot;Warez&quot; - Dictionary.com\" href=\"http:\/\/dictionary.reference.com\/browse\/warez\" target=\"_blank\" rel=\"noopener\">warez<\/a>, is not only illegal, but it also puts personal information at risk. Warez are a popular way for malware authors to spread their wares, as many people still believe they can get something for nothing without realizing the potential consequences.<\/p>\n<p>This is particularly evident with naive children who do not know any better. They can <a title=\"8 Ways to Accidentally Infect Your Friends with Malware\" href=\"https:\/\/www.intego.com\/mac-security-blog\/8-ways-to-accidentally-infect-your-friends-with-malware\/\" target=\"_blank\" rel=\"noopener\">accidentally infect other computers<\/a> in their household with malware by installing pirated software, thus putting the entire home network at risk of information exposure.<\/p>\n<p>Parents can maintain a level of privacy and protect their family by blocking access to peer-to-peer sites and by talking to their children about why it is important to do so. Intego&#8217;s easy-to-use parental control software, <a href=\"https:\/\/www.intego.com\/contentbarrier-secure\">ContentBarrier<\/a>, blocks certain protocols, or types of Internet communication, that parents may not want their children to use, such as peer-to-peer and other file sharing protocols.<\/p>\n<p>The <a title=\"Peer-to-Peer File-Sharing and Copyright Infringement: Are You Vulnerable?\" href=\"http:\/\/www.washington.edu\/students\/gencat\/policy\/p2pshare.html\" target=\"_blank\" rel=\"noopener\">legal repercussions<\/a> alone should be enough of a deterrent, but if not, risk of exposing personal information should motivate parents to block illegal file sharing in their home.<\/p>\n<h3>Password Sharing: Just Say No!<\/h3>\n<p>There is a troubling new trend with young kids carelessly handling their passwords. It has become fashionable for teens to share passwords with friends as a sign of trust and intimacy, and it is a\u00a0spectacularly bad idea.<\/p>\n<p>A recent Pew study <a title=\"PewResearch, Part 3: Privacy and Safety Issues\" href=\"http:\/\/www.pewinternet.org\/2011\/11\/09\/part-3-privacy-and-safety-issues\/\" target=\"_blank\" rel=\"noopener\">found<\/a> that roughly 1-in-3 teens (30%) share their passwords with a friend, boyfriend or girlfriend.<\/p>\n<p>Alongside the significant downsides to sharing passwords, including obsessively watching a significant other&#8217;s social media account for signs of cheating and using the access for sabotage if a relationship goes sour, this not only violates one\u2019s own privacy, but it also puts the individual\u2019s emotional health at risk.<\/p>\n<p>Kashmir Hill at <a title=\"Why Sharing Passwords With Your Girlfriend\/Boyfriend Is A Spectacularly Bad Idea\" href=\"http:\/\/www.forbes.com\/sites\/kashmirhill\/2012\/01\/18\/why-sharing-passwords-with-your-girlfriendboyfriend-is-a-spectacularly-bad-idea\/\" target=\"_blank\" rel=\"noopener\">Forbes<\/a>, for instance, speaking from experience in a past relationship where she and her then-boyfriend knew one another&#8217;s email passwords, described how emotions sometimes get the better of a person when times turn bad in a password-sharing relationship:<\/p>\n<blockquote><p>It wasn\u2019t healthy. Curiosity is a devastating emotion when you have access to a significant other\u2019s account. When times turned bad, I found myself addicted to seeing how he was describing our crumbling relationship to others. I eventually had to ask him to change his password \u2014 which he initially refused to do, seeing it as a nail in the coffin of the relationship \u2014 but I insisted, because I couldn\u2019t stop myself from looking.<\/p><\/blockquote>\n<p>An important lesson to take away from this is that parents should teach their kids the importance of not sharing passwords. It&#8217;s simple: Just say no to password sharing!<\/p>\n<p>Even adults have a hard time managing their passwords securely.\u00a0Get Safe Online (<a title=\"Top safety tips for Get Safe Online Week\" href=\"https:\/\/www.getsafeonline.org\/news\/top-safety-tips-for-get-safe-online-week\/\" target=\"_blank\" rel=\"noopener\">GSOL<\/a>) questioned 2,004 adults about their online behavior and habits, and found that only 42% have a password or PIN on their mobile devices, and only 25% have installed security software. Nearly half of those who do use a password have the same password for all accounts.<\/p>\n<p>For adults who need a bit of a refresher on password protection best practice, do not worry\u2014it is understandable. Everyone lets their guard down every once in a while, it is natural. To start, here&#8217;s\u00a0<a title=\"4 Tips for Creating Secure Passwords\" href=\"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/\" target=\"_blank\" rel=\"noopener\">four quick tips showing how you can create secure passwords<\/a>.<\/p>\n<p>People have limited space in their heads for secure, unique passwords, but that should not mean people should resort to <a title=\"4 Types of Passwords You Shouldn\u2019t Create (Unless You Want Your Account Hacked)\" href=\"https:\/\/www.intego.com\/mac-security-blog\/4-types-of-passwords-you-shouldnt-create-unless-you-want-your-account-hacked\/\" target=\"_blank\" rel=\"noopener\">poor password hygiene<\/a>\u00a0or\u00a0using <a title=\"Just Say \u2018No\u2019 to Password Books \" href=\"https:\/\/www.intego.com\/mac-security-blog\/just-say-no-to-password-books\/\" target=\"_blank\" rel=\"noopener\">password books<\/a>; putting all their password eggs in one basket is a scary proposition.<\/p>\n<div>\n<hr \/>\n<div>\n<p>Next time, we conclude our Five Minute Family Protection Tips series with thoughts on <a title=\"Parental Concerns in the Digital Era: Child Identity Theft\" href=\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-child-identity-theft\/\" target=\"_blank\" rel=\"noopener\">child identity theft<\/a> and a recap on what parents can do to keep their family safe online.<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>This is the third installment in our Five Minute Family Protection Tips series on Internet safety for concerned parents in the digital era. In part 1, we outlined why parents should be concerned with their children&#8217;s online activities and some initial advice about online predators. In part 2, we examined the risks of inappropriate communications [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":25597,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[10,13],"tags":[994],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"This is the third installment in our Five Minute Family Protection Tips series on Internet safety for concerned parents in the digital era. In part 1, we\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-exposing-personal-information\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Exposing Personal Information: Pirated Software and Password Sharing - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"This is the third installment in our Five Minute Family Protection Tips series on Internet safety for concerned parents in the digital era. In part 1, we\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-exposing-personal-information\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-05-14T15:41:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-27T07:23:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/peer-to-peer-file-sharing.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-exposing-personal-information\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/peer-to-peer-file-sharing.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/peer-to-peer-file-sharing.jpg\",\"width\":400,\"height\":260,\"caption\":\"free cheese mousetrap\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-exposing-personal-information\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-exposing-personal-information\/\",\"name\":\"Exposing Personal Information: Pirated Software and Password Sharing - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-exposing-personal-information\/#primaryimage\"},\"datePublished\":\"2014-05-14T15:41:38+00:00\",\"dateModified\":\"2025-10-27T07:23:21+00:00\",\"description\":\"This is the third installment in our Five Minute Family Protection Tips series on Internet safety for concerned parents in the digital era. In part 1, we\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-exposing-personal-information\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-exposing-personal-information\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-exposing-personal-information\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Exposing Personal Information: Pirated Software and Password Sharing\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-exposing-personal-information\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-exposing-personal-information\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Exposing Personal Information: Pirated Software and Password Sharing\",\"datePublished\":\"2014-05-14T15:41:38+00:00\",\"dateModified\":\"2025-10-27T07:23:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-exposing-personal-information\/#webpage\"},\"wordCount\":836,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-exposing-personal-information\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/peer-to-peer-file-sharing.jpg\",\"keywords\":[\"Five Minute Family Protection Tips\"],\"articleSection\":[\"How To\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-exposing-personal-information\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"This is the third installment in our Five Minute Family Protection Tips series on Internet safety for concerned parents in the digital era. In part 1, we","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-exposing-personal-information\/","og_locale":"en_US","og_type":"article","og_title":"Exposing Personal Information: Pirated Software and Password Sharing - The Mac Security Blog","og_description":"This is the third installment in our Five Minute Family Protection Tips series on Internet safety for concerned parents in the digital era. In part 1, we","og_url":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-exposing-personal-information\/","og_site_name":"The Mac Security Blog","article_published_time":"2014-05-14T15:41:38+00:00","article_modified_time":"2025-10-27T07:23:21+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/peer-to-peer-file-sharing.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-exposing-personal-information\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/peer-to-peer-file-sharing.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/peer-to-peer-file-sharing.jpg","width":400,"height":260,"caption":"free cheese mousetrap"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-exposing-personal-information\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-exposing-personal-information\/","name":"Exposing Personal Information: Pirated Software and Password Sharing - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-exposing-personal-information\/#primaryimage"},"datePublished":"2014-05-14T15:41:38+00:00","dateModified":"2025-10-27T07:23:21+00:00","description":"This is the third installment in our Five Minute Family Protection Tips series on Internet safety for concerned parents in the digital era. In part 1, we","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-exposing-personal-information\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-exposing-personal-information\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-exposing-personal-information\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Exposing Personal Information: Pirated Software and Password Sharing"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-exposing-personal-information\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-exposing-personal-information\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Exposing Personal Information: Pirated Software and Password Sharing","datePublished":"2014-05-14T15:41:38+00:00","dateModified":"2025-10-27T07:23:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-exposing-personal-information\/#webpage"},"wordCount":836,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-exposing-personal-information\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/peer-to-peer-file-sharing.jpg","keywords":["Five Minute Family Protection Tips"],"articleSection":["How To","Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-exposing-personal-information\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/peer-to-peer-file-sharing.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-6Ap","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/25321"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=25321"}],"version-history":[{"count":42,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/25321\/revisions"}],"predecessor-version":[{"id":103996,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/25321\/revisions\/103996"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/25597"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=25321"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=25321"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=25321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}