Shared computer

Notifications OFF

6789

Member since
May 2025

163 posts

Post deleted by user


Posted Sat February 7, 2026 6:11am
Edited Tue February 10, 2026 7:28amReport post

rainyday52

Member since
April 2023

669 posts

Hi there - I'm not at all tech minded either but like you would want to be sure I wasn't putting myself at risk inadvertently. I can't help personally but suggest that you ask ChatGPT this question and see what comes back.

Posted Sat February 7, 2026 10:39amReport post

6789

Member since
May 2025

163 posts

Good idea, Rainy day! Thank you

Posted Sat February 7, 2026 11:43amReport post

rainyday52

Member since
April 2023

669 posts

It might be helpful too if you share what you discover for anyone else in the same position....I would certainly be glad to to know if it was me xx

Posted Sat February 7, 2026 2:36pmReport post

Inthemoment

Member since
February 2023

445 posts

We use monitoring that I can see in real time. It enables him to have his own device but I can watch in real time what he's doing if I want to. As we built up trust I might check once a day or once a week. It stores absolutely everything for me to look at and it also emails me immediately if there are any concerns. It's sensitive so I sent him a message with three kisses and it flagged that up because triple x can be a concern.

I can see every website he's looked at, every message sent, every call made etc etc.

We use ever accountable and pay £9 a month for it, but there's various options out there



This would be a more protective option for you in my opinion

Posted Sat February 7, 2026 7:57pmReport post

6789

Member since
May 2025

163 posts

from chat gpt:

1. Are separate, passworded user accounts “enough” on their own?

Technically:[/b]
Yes — properly configured[/i] separate user accounts do keep browsing history, files, saved passwords, cookies, and app data separate[/b] at the operating-system level.

If:

You each have your own OS user account[/b]

Each account has its own login password[/b]

He does not[/b] know your[/i] password

His account is not an administrator account[/b]

Then:

His browser history does not[/b] mix with yours

His downloads are stored under his[/i] user folder

His browser logins and autofill are not accessible to you (and vice versa)

From a forensic[/i] perspective, investigators can see which OS account did what[/b], when, and where.

So your instinct here is correct: this setup already creates an important boundary.

2. Where the risk still exists (this part is important)

Even with separate accounts:

???? Device seizure risk

You already understand this, but to say it clearly:

**If he breaches conditions, the physical device can still be seized

how do i protect myself

I hear how stressful this is. You’re trying to do the right[/i] thing—supporting someone’s rehab and[/b] protecting yourself from very serious consequences. That’s a heavy position to be in.

I’m not a lawyer, but I can give you practical, commonly-recommended safeguards[/b] that people in your situation use to protect themselves. Think of this as risk reduction + evidence of good faith[/i], not a magic shield.

Big picture (important to be clear about)

You’re correct about one thing that’s uncomfortable but crucial:

If he violates conditions, the device can still be seized no matter what.[/b]

The goal isn’t to prevent seizure at all costs — it’s to:

show you took reasonable, proactive steps[/b]

clearly demonstrate separation of access[/b]

avoid being treated as complicit or negligent

That does[/i] matter in investigations.

1. Separate user accounts: necessary but NOT sufficient on their own

What you’re doing now is a good start[/b], but on its own it’s not enough protection[/b].

Yes:

Separate user accounts do[/i] keep browser history, downloads, cookies, saved passwords, etc. separate within the OS[/b].

But:

Investigators know user accounts can be misused

You still own/administer the device

Without logging, filtering, and documentation, they may say you didn’t do enough

So: keep this, but layer protections[/b].

2. You should be the ONLY administrator

This is critical.

Make sure:

Your account = admin[/b]

His account = standard user[/b]

He cannot:

install software

use incognito/private browsing

change system settings

add browsers, VPNs, or extensions

On Windows/macOS this is doable and important.

3. Use monitoring + filtering software (not just history)

This is one of the strongest ways to protect yourself.

Look for software that:

logs websites accessed

blocks categories (adult, anonymizers, file sharing, etc.)

disables private browsing

timestamps activity

keeps logs you cannot alter[/b]

Examples (not endorsements):

Qustodio

Covenant Eyes

Net Nanny

Bark (depending on OS)

Why this helps you[/b]:

It shows active supervision[/b]

It creates an independent record[/b]

It demonstrates you weren’t “turning a blind eye”

4. Network-level protection (very important)

Even better than device-only controls:

Put DNS filtering[/b] on your router (e.g. OpenDNS / CleanBrowsing)

This applies to any device[/i] on your network

Logs exist outside the computer itself[/b]

That matters if:

the device is seized

or someone claims logs were tampered with

5. Written rules + boundaries (this is protection, not mistrust)

This feels awkward, but it’s actually smart.

Have a written agreement[/b] (even informal) stating:

he only accesses the internet under supervision

only on his user account

only at agreed times

you retain admin control

violations end access immediately

You don’t need legal language. Date it. Both sign it. Keep a copy.

This helps show:

intent

structure

accountability

6. Keep a simple supervision log

You don’t need to be obsessive.

Something like:

date

duration of access

purpose (email, job search, rehab work, etc.)

confirmation you were present

If anything ever happened, this shows pattern and diligence[/b].

7. Do NOT share passwords, ever

You’re already doing this right.

Also:

Don’t stay logged into your account

Enable auto-lock when switching users

Use a strong admin password he doesn’t know

8. Consider written guidance from his supervising authority

This is huge[/i] if available.

If he has:

a probation officer

therapist

treatment provider

Ask (in writing) what they recommend or approve[/b] regarding internet access.

If you can show:

“I followed the guidance of his supervising authority”

that is one of the strongest protections you can have.

The honest bottom line

There is no zero-risk setup[/b]. Anyone telling you otherwise is lying.

What you can[/i] do is make it very clear that:

you were cautious

you set limits

you monitored access

you did not enable or ignore risk

That’s how people protect themselves in real life.


Posted Sun February 8, 2026 4:11pmReport post


This Forum is proudly supported by The National Lottery Community Fund