BlockMyself
Urge plan

Have a plan before the weak moment.

The best technical setup still needs a human plan for the moment when you want to undo it.

Pause Message Move device

Use this before opening settings

Technical controls help most when they are paired with a simple plan for the moment when you want to bypass them.

  1. Do not open Settings, Terminal, router admin, browser policy, password manager, or recovery pages.
  2. Move the device away from you: across the room, outside the bedroom, into a shared area, or to the trusted person.
  3. Send the trusted person the prewritten message below.
  4. Change location: stand up, leave the room, go outside, or sit where another person can see your screen.
  5. Wait 10 minutes before making any device change.
  6. If this keeps happening, move from Guardrails to Lockout. The setup is too easy to reverse.

Prewritten message to trusted person

I want to bypass right now. Please do not give me the password, passcode, recovery key, router login, or admin approval. Please reply with: "I am not going to help you bypass. Step away from the device for 10 minutes."
Send this message before the urge happens, so the trusted person understands what you want them to do.

Make bypassing require a pause

Physical friction

  • Charge the phone outside the bedroom.
  • Keep laptops out of private rooms after a set time.
  • Use a shared workspace when urges are predictable.
  • Put the router, spare devices, old phones, and install USBs away from your own immediate access.
  • Ask the trusted person to hold unused devices that become bypass devices.

Digital friction

  • Move admin passwords and recovery keys away before the urge.
  • Remove saved logins for router, DNS, blocker, and parent accounts.
  • Block searches for bypass instructions if your filter supports custom blocklists.
  • Use app limits only as reminders; use lockout for things you keep overriding.
  • Schedule maintenance windows so changes do not happen impulsively.

When the same bypass repeats

Repeated behaviorUpgrade the setup
You keep changing DNS.Use router DNS enforcement, browser DoH policy, and trusted-person admin control.
You keep installing a new browser or VPN.Block app installs, remove admin, use store approvals, and block extensions.
You keep recovering the passcode.Run the recovery audit and move recovery email/phone/backup codes to the trusted person.
You keep using cellular data.Use the mobile-data guide and have the trusted person control carrier or device-account settings where possible.
You keep factory resetting.Device-level controls are not enough. Use account ownership, device management, router enforcement, and recovery handoff.
You keep asking the trusted person for the password.Give them written refusal rules and a maintenance-window policy.

Not a substitute for support

This site is about device and account guardrails. If your situation involves compulsive behavior, distress, relationship harm, or safety concerns, consider adding human support: a counselor, support group, faith/community leader, accountability partner, or medical professional.