BlockMyself

Your Guide to Blocking Inappropriate Content

Full Accountability (Very Technical)

Full accountability methods are for those who are very tech-savvy or need the maximum level of control and lock-down. These can involve network-wide filtering, custom hardware/software setups, or enterprise-level tools configured for home use. At this level, you essentially create an environment where nearly every avenue of inappropriate content is blocked or monitored, but it requires significant technical effort to implement and maintain.

iPhone (Full)

For the iPhone, the highest level of lock-down might involve external hardware/network controls since on-device options are limited by Apple’s sandbox. Here’s what an advanced scenario can include:

At full technical level, the idea is redundancy and non-bypassability. A supervised iPhone with MDM profiles will resist any attempt by the user to delete or alter the restrictions. Pair that with network/VPN enforcement and even if one method is somehow circumvented, another stands in the way. The downside is maintainability – every iOS update or profile change needs to be managed, and using a VPN 24/7 can impact battery and speed. But if done right, this setup makes an iPhone nearly “porn-proof.”

Android (Full)

On Android, a power-user can achieve very strict controls, often by leveraging root access or network controls:

Combining root-level modifications with external enforcement can make an Android device extremely locked down. However, note that a knowledgeable user with physical access who has rooted their phone could also unroot or find ways around, so true full lock-down might require relinquishing some control to an external party. For example, you might root the phone to set it up, but then give it to someone who will periodically check it or hold passwords to apps like AFWall+. In summary, the Full approach on Android is about taking advantage of Android’s openness—either to lock it down with custom configurations or using enterprise-level management to remove freedoms, ironically making it behave more like a controlled iPhone.

Windows (Full)

A fully locked-down Windows environment to prevent inappropriate content can resemble a high-security corporate or school setup. Here are components of such a setup:

This level of control on Windows turns the PC into a kiosk of sorts – heavily restricted. It is appropriate for scenarios like a family computer for young teens where you want near-complete assurance or for personal use if you have a very strong commitment to avoiding vice and are okay with handing over control of the machine’s configs to an accountability partner. The key at Full level is to assume the user will try to circumvent and preempt every method of circumvention. That’s why we combine network, system, and application layers. It’s labor-intensive to set up but can be very effective. Keep in mind, determined individuals might still find obscure ways (technology is ever-changing), so ongoing vigilance is part of the Full accountability approach.

Mac (Full)

On a Mac, full lock-down is a bit trickier than Windows due to the Unix-based system and not having as many third-party enterprise tools available for personal use, but you can still reach a high level of control:

Because Macs are often single-user personal devices, a full lock-down might feel restrictive, but it’s achievable. Think of it as converting your Mac into a “child-proof” workstation: only explicitly allowed things work, everything else is either blocked or requires admin approval. The combination of whitelisting plus network-level enforcement is key. And as always, the admin credentials and any override mechanism should be controlled by someone other than the primary user for true accountability.

Linux (Full)

For Linux, many of the Full strategies overlap with what a sysadmin would do on a server or a network to enforce policy. Essentially, you turn your Linux system (or the network it’s on) into a highly restrictive environment:

Full lock-down on Linux can become a hobby project in itself, using all the open-source tools at your disposal. One important note: Linux gives ultimate freedom, which is double-edged for this purpose. The user (if it’s also the admin) can always theoretically boot from a live USB or mount the drive on another machine and undo changes if they have physical access. Thus, for true enforcement, you need to combine these software measures with physical security (lock the BIOS, etc.) as mentioned in Windows. Assuming you do that, a Linux system can be made as restrictive as any appliance if you invest the time.

(At this level, consider that it might be easier to handle things at the network level. Many find that deploying a single network-wide filter device (like a custom router with all the blocklists and rules) and then simply forbidding unfiltered internet access is simpler than micromanaging every device. See below for hosting and network suggestions.)


Note on External Tools: Across all devices at all levels, there are paid services like Covenant EyesNet NannyQustodioAccountable2You, etc., that can greatly assist or even replace some of the above measures. We’ve focused on free and built-in options, but if you find those lacking, exploring these services is worthwhile. For example, Covenant Eyes provides accountability reports and porn detection on Windows, Mac, Android, and iOS, while Net Nanny offers real-time content filtering with AI. These cost money (subscriptions), so weigh that against the effort of the do-it-yourself methods. Often, a combination can be used – e.g., free OS-level blocks plus a paid accountability app as a backstop.