Router filters do not cover cellular data
A home DNS or router setup applies only while the device uses that network. Phones and tablets need their own controls for cellular data, hotspots, VPNs, and app installs.
- Test the device on Wi-Fi.
- Turn Wi-Fi off.
- Test again on mobile data.
- Try installing a VPN, proxy browser, alternate browser, and alternate app store.
- Try enabling hotspot or joining another hotspot if that is available to you.
- Move carrier, app-store, and account recovery controls to the trusted person where practical.
iPhone and iPad mobile-data hardening
- Finish the iPhone/iPad steps in Guardrails.
- Open Settings -> Screen Time -> Content & Privacy Restrictions.
- Block Installing Apps and Deleting Apps if app changes are a bypass.
- Set Account Changes and Passcode Changes to Don't Allow where available.
- Set Cellular Data Changes to Don't Allow where available.
- Remove VPN, proxy, alternate browser, and hotspot-helper apps you do not need.
- Check Settings -> General -> VPN & Device Management for VPN or DNS profiles.
- Use a DNS profile or supervised/MDM profile only if the trusted person controls the removal path.
- Have the trusted person control the Screen Time passcode and Apple Account recovery path.
- Test Safari, remaining browsers, in-app browsers, Wi-Fi, mobile data, and Personal Hotspot.
Check iCloud Private Relay and Limit IP Address Tracking
Apple network privacy features can change what network filters see. Check both global iCloud settings and each Wi-Fi or cellular network you use.
- Open Settings.
- Tap your name, then tap iCloud.
- Check whether Private Relay is on.
- For Wi-Fi, open Settings -> Wi-Fi, tap the info button next to the network, then check Limit IP Address Tracking.
- For cellular, open Settings -> Cellular, select the line or Cellular Data Options, then check Limit IP Address Tracking.
- If Private Relay bypasses your filter, turn it off for that network or use a supervised/MDM setup controlled by the trusted person.
- Test Safari on Wi-Fi and on cellular data after the change.
Android mobile-data hardening
- Finish the Android steps in Guardrails.
- Use Family Link app approval for new installs.
- Remove extra browsers, VPNs, proxy apps, alternate app stores, and remote desktop apps.
- Open Settings -> Network & internet -> Private DNS and set a family-safe hostname if that fits your filtering provider.
- On Samsung, check Connections -> More connection settings -> Private DNS.
- Turn off developer options if they are enabled.
- If the device is rooted or has an unlocked bootloader, treat local controls as weak and rely more on trusted-person/account control.
- Have the trusted person control the Family Link parent account and recovery path.
- Test Chrome, remaining browsers, YouTube, Google Search, Wi-Fi, mobile data, and hotspot.
Hotspots and second networks
Ways people bypass router rules
- Turn off Wi-Fi and use cellular data.
- Use another phone's hotspot.
- Join a neighbor, workplace, school, public, or guest network.
- Use a travel router or USB tether.
- Use a VPN that hides DNS and traffic from the home router.
How to reduce the gap
- Use device-level controls, not router-only controls.
- Block new app installs and VPN/profile changes.
- Have the trusted person control carrier account settings if practical.
- Remove saved Wi-Fi networks that are bypass paths.
- Test with Wi-Fi off, not only on your home network.
Carrier and account-level considerations
Carrier tools vary and change often. Treat them as an extra layer, not the only layer.
- Check whether your carrier offers account-level content filtering, line restrictions, hotspot restrictions, or parental controls.
- Have the trusted person own or help secure the carrier account login if carrier settings matter.
- Disable hotspot or tethering if that is a bypass and your plan/device supports controlling it.
- Confirm whether the carrier setting applies to cellular data only, Wi-Fi only, or both.
- Retest after SIM changes, eSIM changes, phone upgrades, and plan changes.
Mobile-data test
- Open the blocked test domain on home Wi-Fi.
- Turn Wi-Fi off.
- Open the same test domain on cellular data.
- Try the same test in every remaining browser and in-app browser.
- Try to install a new browser or VPN. Stop at the approval prompt.
- Record what failed and fix that exact layer.
More guides
Use these when you need a checklist, a specific bypass closed, or a clearer handoff plan.
Test your setup
Browser, DNS, mobile data, recovery, and reset-path tests.
Setup recipes
Direct paths for phones, laptops, technical users, and whole-home setups.
Recovery audit
Find passwords, backup codes, router logins, and reset paths.
Browser policy
Chrome, Edge, and Firefox policy examples.
Mobile data
Close cellular, Private DNS, VPN, and hotspot gaps.
Apps and platforms
Search, YouTube, social apps, app stores, TVs, and in-app browsers.
Router recipes
DNS enforcement, guest networks, IPv6, Pi-hole, and AdGuard Home.
Urge plan
What to do before trying to bypass.
Trusted handoff worksheet
Printable inventory for passcodes, recovery paths, and refusal rules.
Glossary
Plain-language definitions for DNS, DoH, VPNs, MDM, recovery keys, and more.