The are two account options for this extension: Guardian(s) - A user in charge of managing content on a user's homepage and what pages are accessible by the user. Protected User(s) - The person in need of monitoring, restrictions, and easy navigation.
After the two accounts have been made, the Guardian is then responsible for linking the accounts using an account access code.
The Guardian will also be given the choice to set up a contact list of trusted users for the protected user.
Guardian Control Options
To ensure the safety of the protected user(s) Easy-Clicks will not permit the protected user(s) to access any links that are not
added to the allowlist either by Guardian permission or recommendation of Easy-Clicks.
Guardians have two options of permitting styles to suit their ideal monitoring preferences: Manual permitting and Automatic permitting.
Additional features to help the Guardian protect and teach linked users include malware scans of site not already on the allowlist,
notifications of activity and trend reports for blocked malicious sites and Guardian added blocklist sites.
Automatic Permitting
Automatic Permitting is a tradeoff between safety and convenience.
This feature is for moments when the Guardian wants a more hands off approach. Automatic Permitting allows the
protected user(s) to access any page that is not deemed malicious at anypoint while still notifying the Guardian of what was accessed.
Compared to Manual Permitting this option does not give the Guardian a chance to assess if a site or action is suspicious.
Manual Permitting
The recommended option for this extension is the Manual Permitting setting.
The advantage provided by Manual Permitting is that the Guardian can curate what sites the protected user can access.
Not only for personal interests, but also defending from attacks that use tools that are not malicious.
Picture this: You are a Guardian and you receive a notification that the account you are monitoring wants access to anydesk.com,
perhaps you have no clue what this could be for so that prompts you to investigate and discover that it is a remote desktop software.
Such an opportunity could then give you the chance to check on the protected user and investigate why they need such a software. The result
being that this could potentially prevent attacks or scams from occurring.