Digital Literacy, Privacy, and Opportunities Intermediate/Middle Students Ages 12-14 (Grades 6-8)
Program Notes

The White Hatter YouTube Programs
Weekly News Shownot your typical tech news or gaming showcase. Each week, we’ll explore real-world stories, digital trends, and accessible emerging technologies that shape everyday life, from online risks to new opportunities. https://www.youtube.com/playlist?list=PLoVKKRoNdLhuf0FjefKp1p2gJ0nOqyAC9 | ![]() |
Unanswered Questions - Live Broadcast Aftershow Questions From StudentsSometimes during our live school broadcasts, we don’t have time to answer all the amazing questions from students. Darren and Brandon Laur from The White Hatter answer the top-voted, unanswered questions every month across all the schools and student groups we visit. https://www.youtube.com/playlist?list=PLoVKKRoNdLhsq3-PEn2qIGXC71MOXplLM | ![]() |
Teen Leaders in TechnologyToo often, conversations about youth, technology, and social media focus only on risks and harms. In this interview series, we shift that narrative and spotlight how teens are using technology creatively, responsibly, and for real-world impact. https://www.youtube.com/playlist?list=PLoVKKRoNdLhtqCnWKTlvVywwbeLoJa_wB | ![]() |
Post Workshop Classroom Questions
Comprehension & Recall
What is the main purpose of the White Hatter workshop presentations?
Answer: The purpose of the workshop is to teach people how to use technology, devices, and the internet in a safer, smarter, and more effective way while understanding both risks and opportunities.
Why is prevention better than responding after something goes wrong online?
Answer: Because reacting after something bad happens does not stop the harm from occurring, while prevention helps people avoid problems before they happen.
Why is technology likely to be part of your future success?
Answer: Because almost every plan, career, goal, or opportunity involves technology in some way, whether for learning, creating, communicating, or problem-solving.
What example was given of a student using AI to solve a real-world problem?
Answer: A college student used AI (ChatGPT) to help write a dispute letter for an incorrect parking ticket, which resulted in the ticket being dismissed.
What example was shared of a student using technology to build a career opportunity?
Answer: A student passionate about Lego animation created a plug-in used by professional studios and later secured a job in animation because of their online work and skills.
What does The White Hatter mean when they say “most of what you do online is on someone else’s computer”?
Answer: It means that websites, apps, messages, online games, and data are processed and stored on external servers owned by companies, not just on your personal device.
What are servers, and why are they important to the internet?
Answer: Servers are large computers that store data, run websites and apps, and process online activity. They make the internet work.
What is a device IP address similar to?
Answer: An IP address is compared to a home address or car license plate
Why does deleting browser history or using incognito mode not make someone anonymous online
Answer: Because it only removes records from your own device, not from the servers and websites you connect to, which still collect data.
How can repeated online messages become illegal, even if a single message seems harmless
Answer: When messages are unwanted, repeated, and continue after someone asks them to stop, they can meet the legal definition of harassment.
Why is it risky to blindly trust AI-generated information?
Answer: Because AI can produce incorrect or fabricated information, and users are still responsible for verifying accuracy.
What are some common tracking technologies that are used every day?
Answer: IP Address, user history, GPS, Browser ID
What is a Browser or Device ID, similar to a fingerprint?
Answer: Online tracking also considers differences between devices, apps, and settings. For example, two people might have the same phone, but they’ve customized it differently, and those differences are tracked.
Why do apps sometimes ask for permissions they don’t actually need?
Answer: Some apps collect extra data to build user profiles or sell information, even when the permission is not necessary for the app’s function.
How does GPS tracking benefit users, and how can it also create privacy risks?
Answer: GPS helps with navigation and location-based services, but it can also allow apps to track where users are if permissions are not managed carefully.
Why can people working for online companies or apps sometimes access user data?
Answer: Because the data is stored on their systems, and employees may have access as part of their job, which can be abused if safeguards fail.
Why is understanding how the internet works important for digital safety?
Answer: Because knowing where data goes and who controls it helps people make safer and more informed choices online.
How does online activity create a digital record even if you delete things locally?
Answer: Because servers and platforms keep logs and records that are separate from your personal device.
Why does The White Hatter encourage people to read pop-ups and permission requests carefully?
Answer: Because those pop-ups explain what data an app wants access to, and approving them blindly can expose personal information.
When is it appropriate to use AI tools, and when might it be inappropriate?
Answer: AI is appropriate when used as a support tool, but inappropriate when relied on blindly or used in situations requiring verified accuracy without review.
How does convenience influence the choices people make about privacy?
Answer: People often accept permissions quickly to avoid interruptions, even when it risks privacy.
How are secret group chats not private?
Answer: Anyone in the group can take a picture copy of the chat and share it
What were some examples of something private, hidden, or deleted get leaked?
Answer:
Photo cropping bug where edited pictures contained the original photo in the data
a software bug where old deleted photos reappeared in the photo album
What is a data breach?
Answer: a security incident where protected, confidential, or sensitive information is accessed, disclosed, or stolen without authorization.
What kind of private account information was leaked in a data breach
Answer: anything in the account
phone number
email address
passwords
names
If something is private on a device, what are some ways it can leak?
Answer:
The device is lost
The device is stolen
The device is hacked
If a picture can get lost in a photo album of 1000+ images
accidentally backing up a secret online
Getting the device repaired and the tech person makes a copy
When it comes to hackers, hacking, and viruses, what are the chances you will be randomly hacked?
Answer: If you are intentionally downloading things you should not be, the chances go way up of being hacked.
Why is downloading a premium $80 game or app from a non-official website for free?
Answer:
Legal piracy concerns
Legal stealing concerns
Virus risk
Why is what you do offline, out in public, finding its way online?
Answer:
Everyone has a 4K camera on their phone
More buildings with cameras
Smart glasses with cameras are more common
What are some ways you can control your online privacy
Answer:
Private your account
Connect with only people you know
Properly use passwords
Use privacy settings
Always consider nothing 100% private
Application & Real-World Scenarios
If an app asks for your location but doesn’t need it, what should you do?
Answer: Deny the permission or review settings carefully before allowing access.
How could you use technology to support a personal goal safely?
Answer: By learning skills, showcasing work online responsibly, and protecting personal information.
What steps would you take before trusting information generated by AI?
Answer:Verify facts using reliable sources and review the content carefully.
How would you respond if someone kept messaging you after you asked them to stop
Answer: Document the behavior, stop engaging, and seek help or report it if necessary.
What permissions would you review first when installing a new app?
Answer: Location, microphone, camera, contacts, and data access permissions.
How might online actions today affect future education or job opportunities?
Answer: Online behavior can create records that impact reputation, opportunities, or legal outcomes.
If a friend believes incognito mode makes them invisible online, how would you explain the reality?
Answer:It only hides activity on their device, not from websites, servers, or service providers.
What kinds of online behaviour could unintentionally break the law?
Answer: Harassment, repeated unwanted messaging, misuse of data, or sharing content irresponsibly.
How can understanding tracking help you make safer online choices?
Answer:It allows you to limit permissions, manage privacy settings, and reduce data exposure.
What is one change you could make to your digital habits after watching this video?
Answer: Reading permissions carefully, verifying information, or being more mindful of online behavior.
Reflection
What part of the presentation surprised you the most, and why?
Answer:(Student response, based on personal reflection.)
How has your understanding of privacy changed after watching this?
Answer:(Student response – expected to reference servers, tracking, or data control.)
Answer:Likely no, because much of it happens behind the scenes on systems people never see.
Should professionals be held to higher standards when using AI tools? Why?
Answer:Yes, because they are trained experts and responsible for ensuring accuracy and ethical use in their work.
How could misunderstanding how the internet works lead to serious consequences?
Answer:People may believe they are anonymous or safe when they are not, leading to legal, personal, or professional consequences.
Why might students be especially vulnerable to privacy risks online?
Answer: Because they may not fully understand how data collection works or long-term consequences of online actions.
How can something intended as a joke online turn into harassment?
Answer: If it becomes repeated, unwanted, and continues after someone asks for it to stop.
Why do you think people often underestimate how much data is collected about them?
Answer: Because data collection happens behind the scenes on servers and platforms that users do not see.



