BlockMyself
Glossary

Plain-language definitions for blocking terms.

Use this page when a guide mentions DNS, DoH, MDM, recovery keys, profiles, allowlists, or other terms that sound more complicated than they are.

DNS VPNs Recovery

How to use this glossary

You do not need to master every technical term before starting. Use the definitions to decide which layer applies to your setup, then return to the guide you were following.

  1. If a term describes a network path, check Friction, Routers, and Mobile data.
  2. If a term describes an app or browser path, check Browser policy and Apps and platforms.
  3. If a term describes passwords, recovery, admin, or reset paths, check Recovery audit and Trusted person.

Terms

TermPlain meaningWhy it matters
DNSThe lookup system that turns a site name into an internet address.Filtered DNS can block categories before the browser connects.
Filtered DNSA DNS resolver that refuses to resolve blocked categories or domains.Useful as a broad layer, but bypassable if the device can choose another resolver.
DNS-over-HTTPS / DoHDNS lookups sent inside normal encrypted web traffic.Can bypass router DNS rules unless browser policy or device management controls it.
DNS-over-TLS / DoTEncrypted DNS usually sent on TCP port 853.Can bypass ordinary DNS controls unless the router blocks or redirects it.
Private DNSAndroid's setting for DNS-over-TLS to a chosen provider hostname.Can help cover Wi-Fi and mobile data, but must be protected from changes.
iCloud Private RelayApple privacy feature that hides some browsing/network information through relays.Can change what network filters see, especially for Safari and Apple privacy paths.
VPNAn encrypted tunnel to another network or provider.Often bypasses DNS, router logs, and local network filtering.
ProxyA service or extension that fetches sites on your behalf.May hide the final site from the browser, DNS filter, or router.
RouterThe device that connects your home network to the internet.Good place for whole-home filtering, but it does not control mobile data or other networks.
IPv4 / IPv6Two address systems used by internet devices.If IPv6 DNS is unfiltered, devices may bypass an IPv4-only setup.
Admin accountAn account that can install software and change system settings.The daily user should usually be standard, not admin, when lockout matters.
Standard accountA limited account that cannot change major system settings without admin approval.Reduces casual bypasses through installs, DNS changes, and policy edits.
Root / sudoLinux/macOS ways to run commands with full system control.Anyone with root or sudo can usually undo local blocking.
MDMMobile Device Management: a system for enforcing settings on devices.Can make settings harder to remove, especially on supervised Apple or managed ChromeOS devices.
Supervised deviceAn Apple device enrolled in a stronger management state.Allows stricter controls than a normal personal device, but setup and ownership matter.
Configuration profileA file that installs settings such as DNS, VPN, certificates, or restrictions.Useful only if the daily user cannot simply remove it.
Recovery keyA code or key used to regain access to an encrypted device or account.If you hold it, you may still be able to regain control alone.
AllowlistA rule that allows only approved sites, apps, or actions.Stronger than trying to block every bad site, but more restrictive.
BlocklistA list of denied sites, apps, domains, or categories.Easier to start with, but misses new domains, mirrors, and broad-purpose platforms.
Factory resetResetting a device back to setup state.Can remove local controls unless account recovery, activation locks, or management still apply.
External bootStarting a computer from USB or another disk.Can bypass or alter the installed operating system if firmware and disk encryption are weak.
In-app browserA browser window inside another app.May not follow the same controls as Safari, Chrome, Edge, or Firefox.
Remote desktopUsing one device to control or view another device.Can bypass local controls if the remote computer is unrestricted.

Four bypass buckets