Use this before opening settings
Technical controls help most when they are paired with a simple plan for the moment when you want to bypass them.
- Do not open Settings, Terminal, router admin, browser policy, password manager, or recovery pages.
- Move the device away from you: across the room, outside the bedroom, into a shared area, or to the trusted person.
- Send the trusted person the prewritten message below.
- Change location: stand up, leave the room, go outside, or sit where another person can see your screen.
- Wait 10 minutes before making any device change.
- If this keeps happening, move from Guardrails to Lockout. The setup is too easy to reverse.
Prewritten message to trusted person
I want to bypass right now. Please do not give me the password, passcode, recovery key, router login, or admin approval. Please reply with: "I am not going to help you bypass. Step away from the device for 10 minutes."
Make bypassing require a pause
Physical friction
- Charge the phone outside the bedroom.
- Keep laptops out of private rooms after a set time.
- Use a shared workspace when urges are predictable.
- Put the router, spare devices, old phones, and install USBs away from your own immediate access.
- Ask the trusted person to hold unused devices that become bypass devices.
Digital friction
- Move admin passwords and recovery keys away before the urge.
- Remove saved logins for router, DNS, blocker, and parent accounts.
- Block searches for bypass instructions if your filter supports custom blocklists.
- Use app limits only as reminders; use lockout for things you keep overriding.
- Schedule maintenance windows so changes do not happen impulsively.
When the same bypass repeats
| Repeated behavior | Upgrade the setup |
|---|---|
| You keep changing DNS. | Use router DNS enforcement, browser DoH policy, and trusted-person admin control. |
| You keep installing a new browser or VPN. | Block app installs, remove admin, use store approvals, and block extensions. |
| You keep recovering the passcode. | Run the recovery audit and move recovery email/phone/backup codes to the trusted person. |
| You keep using cellular data. | Use the mobile-data guide and have the trusted person control carrier or device-account settings where possible. |
| You keep factory resetting. | Device-level controls are not enough. Use account ownership, device management, router enforcement, and recovery handoff. |
| You keep asking the trusted person for the password. | Give them written refusal rules and a maintenance-window policy. |
Not a substitute for support
This site is about device and account guardrails. If your situation involves compulsive behavior, distress, relationship harm, or safety concerns, consider adding human support: a counselor, support group, faith/community leader, accountability partner, or medical professional.
More guides
Use these when you need a checklist, a specific bypass closed, or a clearer handoff plan.
Test your setup
Browser, DNS, mobile data, recovery, and reset-path tests.
Setup recipes
Direct paths for phones, laptops, technical users, and whole-home setups.
Recovery audit
Find passwords, backup codes, router logins, and reset paths.
Browser policy
Chrome, Edge, and Firefox policy examples.
Mobile data
Close cellular, Private DNS, VPN, and hotspot gaps.
Apps and platforms
Search, YouTube, social apps, app stores, TVs, and in-app browsers.
Router recipes
DNS enforcement, guest networks, IPv6, Pi-hole, and AdGuard Home.
Urge plan
What to do before trying to bypass.
Trusted handoff worksheet
Printable inventory for passcodes, recovery paths, and refusal rules.
Glossary
Plain-language definitions for DNS, DoH, VPNs, MDM, recovery keys, and more.