1. Welcome to NoFap! We have disabled new forum accounts from being registered for the time being. In the meantime, you can join our weekly accountability groups.
    Dismiss Notice

Block porn from your device – A Guide [Windows] [Android]

Discussion in 'Rebooting - Porn Addiction Recovery' started by IR254, Apr 24, 2022.

  1. IR254

    IR254 Fapstronaut

    676
    2,233
    123
    Note: This thread may be edited and things might be added or removed over time. Consider this thread to be a work-in-progress type of thing.

    It took me many hours to write this guide. If you have any problems or questions, I would therefore greatly appreciate if you took the time to thoroughly read the entire post first before asking. If your question or problem was not answered, then please feel free to ask in this thread. I (and maybe other users) will try to answer them to the best of our ability.

    This guide is split into multiple posts, because it was too long to post in just one post. Scroll down for the other parts of the guide.

    Important: In case you know about a loophole or find one while using this method, please do NOT post it here and do NOT message me about it unless you know how to fix it reliably!

    Disclaimer: I wrote this guide to the best of my ability and knowledge. However, you - and only you - are responsible in case anything goes wrong. Use at your own risk.
    _____________________________________________________________________

    Table of content:
    A) FAQ (Post#1)
    B) Windows Guide (Post#2)
    I. Windows accounts
    II. DNS
    III. Hosts file
    IV. RunAsTool
    V. Optional: Browser-based addon (Allow more customization)
    1. Which addon to use
    2. Potential use cases and examples
    3. How to make the addon uninstallable
    4. How to configure the addon properly
    VI. How to store passwords properly (no other people needed)
    C) Android Guide (Post #3)
    I. DNS
    II. Pluckeye Webbrowser
    III. Lock settings and other things
    IV. Save your passwords/passcodes​

    _____________________________________________________________________

    A) FAQ:

    “What is this thread about?”

    This thread is meant to act as a guide on how to block porn effectively on your Windows and android devices. This combination of things was discovered over a long period of time by trial and error on my part. I am by no means a programmer or computer engineer, but I figured stuff out as I went. Basically, I started very basic and by finding-and-fixing one loophole after another, slowly but surely this system came together. Keep in mind though, that this system was found and developed with and for my habits. It might be too restrictive or too mild in your specific case. Feel free to ask questions, I or another forum member might be able to help.


    “Why even post this?”


    In another thread not too long ago, I was asked to share my way of blocking porn on an android device. By the feedback in that thread, my “guide” apparently was helpful for some people. That’s why I decided I might as well share my way of blocking porn on Windows. I will include the android part as well, just for convenience. Maybe this guide can help some people out there with restricting their access to porn.


    “Why use blockers? Aren’t you weak for using them?”

    Maybe. I don’t know. You be the judge. But why do I use them? Out of experience. I was trying to quit porn for over six years with willpower alone and it just didn’t work. Then I decided I would try blockers, did some research, made some tests and found them tremendously helpful. Yea, blockers might not be bulletproof (but maybe somewhat close…?) but that’s not the point anyways. Blockers are meant to be an aid, not a solution. They are supposed to keep you from making bad decisions and/or make you overthink your plans. And I believe they are perfectly capable of doing both……if you do it correctly.


    “But can’t you just bypass blockers anyway? They suck, you know…”

    Well, hopefully not if you follow this guide. But agreed, an experienced user will probably (maybe?) find ways to bypass this system. I am just a regular, self-regulating, self-taught dude, who experimented his way to a well-functioning system for himself. But I have hopes that basic and intermediate users might benefit from this guide. If it didn’t help, I guess I tried at least.


    “Okay, but aren’t blockers a huge pain in the ass? They block stuff, you know…”

    Yea, they can be annoying. But that’s kinda the point, isn’t it? Also, with this system, you have plenty of options to customize your own personal user experience to your own liking. But obviously, every blocking solution will most likely block some things, which you don’t want blocked. But that’s the price to pay, I guess. There is no solution I am aware of, that doesn’t come with that sort of problem. But I really tried to make this solution as user-friendly as possible and I am personally very satisfied with my results. Keep in mind, that I put this system together for myself, so I had a great interest in making this as good as possible.


    "Will this cure my porn addiction?"

    It will not, I'm afraid. Addiction is complex and unfortunately, recovery isn't as easy as installing some blockers. However, I personally find it extremly helpful to have systems like these in place whenever you feel weak or tempted to go back. That being said, you'll still need to really want to change your life.


    “What IS and what ISN’T this guide?”

    It IS a relatively basic, but nevertheless thorough guide on how to setup a well-working blocking regiment on your devices, assuming you know the basics of how to operate and setup a computer. It will also explain why I chose to do certain things over others to help you decide if you need to do all of this. Maybe parts of it are enough for your specific use case.

    It IS NOT an extremely detailed step-by-step guide for people, who have no idea how a PC works. You are very welcome to ask any questions you might have and I (and maybe other forum members) while try to help you out to the best of our ability, but I can’t promise that I can help with your specific problems. Also, this system is NOT a universally applicable solution for every person out there; if and how well this works, might be depending on what hardware and software you use.


    “What about Linux, macOS, iPhone, ….?”

    Sorry, I can’t help you with that. I only use my Windows PC and my android phone, and therefore I only have systems in place for those two. I have no idea how to do any of this on any other device or operating system.

    Maybe this guide (which works somewhat differently from mine) by another forum member can help you with your system.


    “What IS needed for this blocking system to work?”
    - Patience
    - Willingness to put some time and effort into this
    - Basic understanding of how to operate a Windows PC and/or Adnroid phone
    - A computer and/or phone (duh)


    “What is NOT needed for this blocking system to work?”
    - Other people (no “Hey, can you store this password for me? Why? Err, you know…reasons”)
    - Money (it can make things more convenient and user-friendly, though)
    - Willpower (well….maybe a little bit)
     
  2. IR254

    IR254 Fapstronaut

    676
    2,233
    123
    B) WINDOWS PART
    Info: This guide was made with and for Windows 10. It may or may not work on Windows 11.


    I. Windows Accounts
    The basis of this system will be the use of two separate Windows accounts on your PC. We will have one Standard user account (your everyday account) and one Administrator account (for setting everything up safely). This has the benefit, that we can configure everything like we want, have it work for all users, and still be able to lock ourselves out after everything is up and running.

    If you do not already have two accounts set up this way, I’d suggest creating a new admin account and “downgrading” your existing one to a standard account in your windows account settings. This way you won’t have to deal with transferring any of your data around. The admin account will not be used much after being set up properly anyways, so the settings don’t matter too much.

    When you create a new account, you can set a very basic password for now, which will cause less pain when testing everything (restarting, logging in and out). Once everything works though, we will change the password to a randomly generated, secure password anyways. I usually use this site to generate a completely random password. Usually, I only allow numbers and symbols, because it’s way harder to memorize such a password in my experience.


    II. DNS
    Once you have created your two accounts, log into your admin account.

    First, we will lay the foundation of our blocking system, which consists of a version of CleanBrowsing DNS. Why CleanBrowsing instead of other services, that offer the same thing (e.g. OpenDNS)?

    First of all, CleanBrowsing was more effective in blocking pornographic sites than other DNS services in my tests, which sometimes over- and/or underblocked quite heavily.

    Secondly, CleanBrowsing offers three different DNS servers, which are absolutely free as well as a paid version, which allows lots of customization. I personally decided to pay for a monthly subscription to be able to tweak everything to my own liking. It’s not that expensive, so you might consider this if the free versions are too restrictive for you. If you choose to do so, make sure to create a new email address (with a randomly generated password) and also set that password for the account itself. Otherwise, you could simply log into their website and change your settings, which makes this step entirely useless. Write that password down for now and don’t lose it. We will store it safely later (see below). I recommend to just use the same password as your windows account; if everything works fine, you won’t remember it anyways, so there is no point in creating many different passwords. Although, if you want to be extra careful, you can also choose different passwords for everything (but don’t lose them!).

    To set up the DNS server, you can use the application, that’s available on their website. However, I would recommend setting it up manually because a manual setup gets rid of one more potential weak point: The application still seems to have some minor bugs and problems. So, in this case, I find it better to just use the built-in windows functionality.

    To set it up manually, right-click on the internet symbol in your task bar in the bottom right. Click on Network- and Internet settings. Click Change adapter options. Right-click on the network you are using (if you have multiple networks, do it for each one, so that you can’t simply change your network) and select Properties. Then under the options for IPv4 and IPv6 select the manual server option and enter the respective addresses you find here (scroll down on the site) or your custom addresses found in your CleanBrowsing user settings (in case you decide to pay for a subscription).

    Note: If you have access to multiple networks, you must repeat that step for every single one of them. Otherwise, you could simply connect to a different network, to which these settings do not apply.

    Great, you are done. It should work now.

    Note: If no other people use your network, you could also set this up on a router level to make it stick for every device in your network at once. Please refer to the instructions given by your specific router on how to set a specific DNS server.

    To test if it works, clear your DNS cache by opening up the CMD console and entering the following line “ipconfig /flushdns” (without the “ “ ) and pressing enter. Then open a browser window and try to open a mainstream “bad” site. If everything works, it should be blocked. If you pay for a subscription, you can also block sites, that aren’t blocked already, as well as whitelist websites, which do get blocked by default, but you want to be accessible. I find that incredibly helpful.

    Note: Keep in mind, that everything you setup in your paid version of CleanBrowsing will also carry over to your android device, if you choose to follow the android part of this guide as well because we will also use this DNS server on our phone. Also, every time you change anything in your user settings, it can take a few minutes until it applies to their servers. So don't worry, if it seems to not work at first. Wait a bit and try again.


    III. Hosts file
    DNS alone should already block most of the bad stuff, but we will add another layer protection, which basically acts as a more personal version of filtering and as a backup in case something goes wrong with your DNS server. This following step also allows you to “overwrite” the CleanBrowsing settings on your PC (don’t worry, it’s NOT a loophole!), so that you can have different rules apply between your PC and your android device.

    We will make use of the Windows hosts file, which by default is located at C:\Windows\System32\drivers\etc. With this file, you can basically manually change the IP addresses your PC will go to, when you enter a specific domain. Essentially, a domain is only a name. The PC must then look up what IP address stands behind that name in order to be able to open a website. The PC basically asks a DNS server (the thing we changed before) what IP address stands behind www.google.com for example. To stay in that analogy, the hosts file is basically a local address book so to speak. Your PC will first look a name up in your own personal address book and only if it can’t find anything, it will ask a DNS server for help.

    We can take advantage of that, by pointing unwanted websites to an IP address, that doesn’t work (0.0.0.0). You want to edit the hosts file with a text editor of your choice and add websites, you don’t want to visit anymore. Make sure it looks like this (google is an example):

    0.0.0.0 google.com
    0.0.0.0 www.google.com

    Some websites need both of these entries to be blocked effectively, for others just the first does the trick. I would recommend to just add both. Also, keep in mind, that you can NOT block things like https://www.google.de/search?q=example with the hosts file. You can only block the main domain OR subdomains (e.g. accounts.google.com). If you want to block things like the example above, see the “addon method” part of this guide below.

    Note: There are pre-configured hosts files available for download on the internet, which usually contain large lists of porn sites. However, I personally would not recommend using such a huge list (often 10.000 or 20.000 entries long!), for two reasons: For one - unless you look through thousands of entries by hand - you don't know what gets blocked or re-reouted somewhere else. And two, after reaching a certain amount of entries, Windows tends to slow down significantly whenver you try to use a browser, which is a big pain in the butt.

    For Google and YouTube specifically, there are IP addresses provided by Google, which will route you to a filtered version of YouTube/Forced-safe-search variant of Google. If you want to use them, do it like this.

    Note: Keep in mind, that CleanBrowsing already enforces this on its own. However, it can't hurt to add these entries regardless.


    216.239.38.120 m.youtube.com
    216.239.38.120 www.youtube-nocookie.com
    216.239.38.120 www.youtube.com
    216.239.38.120 youtube-nocookie.com
    216.239.38.120 youtube.com
    216.239.38.120 youtube.googleapis.com
    216.239.38.120 youtubei.googleapis.com

    216.239.38.119 m.youtube.com
    216.239.38.119 www.youtube-nocookie.com
    216.239.38.119 www.youtube.com
    216.239.38.119 youtube-nocookie.com
    216.239.38.119 youtube.com
    216.239.38.119 youtube.googleapis.com
    216.239.38.119 youtubei.googleapis.com

    216.239.38.120 google.com
    216.239.38.120 www.google.com
    216.239.38.120 google.de
    216.239.38.120 www.google.de


    As you can see in this example, I personally only re-routed the main google domain as well as the German top-level domain. The reason for that is, that I block every other top-level domain from Google (see below). If you do not want to block the other google domains entirely, then do the same thing as in the example for every single top-level domain google offers.

    Creating an effective and thorough hosts file will take some time and effort on your part. You’ll have to think about what “bad” sites you usually visit and then you have to add every single one of them in this file and save it. Just for reference, my hosts file consists of around 2.300 hand-picked entries (no, they are not all porn sites).

    If you are interested, I included a list of interesting domains, which you might want to block. These are mainly focussed on allowing common sites, while blocking some or all content on them:

    This will block all images and videos, while still allowing Reddit itself; but you probably need to block the image hosters below as well.

    0.0.0.0 i.redd.it
    0.0.0.0 v.redd.it
    0.0.0.0 preview.redd.it
    0.0.0.0 external-preview.redd.it
    0.0.0.0 a.thumbs.redditmedia.com
    0.0.0.0 b.thumbs.redditmedia.com
    0.0.0.0 styles.redditmedia.com

    This will block all images and videos, while still allowing Twitter itself.

    0.0.0.0 pbs.twimg.com
    0.0.0.0 video.twimg.com

    This will block all images and videos including banners and avatars, while still allowing Discord itself:

    0.0.0.0 images-ext-1.discordapp.net
    0.0.0.0 images-ext-2.discordapp.net
    0.0.0.0 media.discordapp.net
    0.0.0.0 cdn.discordapp.com

    This will block all images and videos including stories, while still allowing Instagram itself:

    0.0.0.0 i.instagram.com #Restrict Instagram stories
    0.0.0.0 scontent-muc2-1.cdninstagram.com #Restrict Instagram pictures

    This will block image hosters, which are often used for uploading porn. This will also block the uploaded content on other sites like Reddit and Twitter, where they often get linked.

    0.0.0.0 i.imgur.com
    0.0.0.0 imgur.com
    0.0.0.0 www.imgur.com
    0.0.0.0 gfycat.com
    0.0.0.0 www.gfycat.com
    0.0.0.0 gettyimages.com
    0.0.0.0 www.gettyimages.com
    0.0.0.0 redgifs.com
    0.0.0.0 www.redgifs.com
    0.0.0.0 i.redgifs.com

    This will block search engines other than safe.DuckDuckGo (which I personally use for multiple reasons) and/or Google. The reason for this is, that some/all of these either have no safe-search at all or one, which isn't doing a great job. I can't guarantee, that this list contains every single search engine out there (it doesn't). The popular ones should be included though.

    Note: Google uses national domains, which are contained in this list. You can either block them (like I do) or route them to the forced-safe-search version, I mentioned above. Also, please keep in mind, that this section is just a copy of my settings, so please look through them before using them! You may want to delete some or add some more.


    0.0.0.0 bing.com
    0.0.0.0 bing.net
    0.0.0.0 explicit.bing.net
    0.0.0.0 mm.bing.net
    0.0.0.0 www.bing.com
    0.0.0.0 www.bing.net
    0.0.0.0 www2.bing.com
    0.0.0.0 www3.bing.com

    Same as with Google: For image search see below.

    0.0.0.0 duckduckgo.com
    0.0.0.0 duckduckgo.de
    0.0.0.0 duckduckgo.net
    0.0.0.0 www.duckduckgo.com
    0.0.0.0 www.duckduckgo.de
    0.0.0.0 www.duckduckgo.net


    0.0.0.0 de.images.search.yahoo.com
    0.0.0.0 de.search.yahoo.com
    0.0.0.0 images.search.yahoo.com
    0.0.0.0 search.yahoo.com
    0.0.0.0 yimg.com

    0.0.0.0 aol.com
    0.0.0.0 aol.de
    0.0.0.0 aolsearch.com

    This blocks the first couple of images on the Google image search. It is not possible to block all of the results unfortunately. If you want to block Google Images alltogether, you might want to use the addon-method explained below.

    0.0.0.0 encrypted-tbn.l.google.com
    0.0.0.0 encrypted-tbn.l.gstatic.com
    0.0.0.0 encrypted-tbn0.gstatic.com
    0.0.0.0 encrypted-tbn1.gstatic.com
    0.0.0.0 encrypted-tbn2.gstatic.com
    0.0.0.0 encrypted-tbn3.gstatic.com
    0.0.0.0 tbn.l.google.com


    Same for DuckDuckGo, but unlike Google this blocks all images; the three entries below work for both, duckduckgo.com and safe.duckduckgo.com:

    0.0.0.0 external-content.duckduckgo.com
    0.0.0.0 external-content.duckduckgo.de
    0.0.0.0 external-content.duckduckgo.net

    This blocks the wayback machine from archive.org, so that you can’t visit archived versions of porn sites:
    0.0.0.0 web.archive.org

    This blocks images on Wikipedia if you need it:
    0.0.0.0 upload.wikimedia.org

    Blocks access to a site, which can bypass your settings for YouTube
    0.0.0.0 nsfwyoutube.com

    IV. RunAsTool
    Note: If you dont have any programs, that need admin privileges, you can skip this step entirely if you want. You may still want to take notice of the part about files and folders at the end though.

    Make a list of all programs/drives/files/folders, which you will need access to later and which will need admin privileges – and therefore the admin password – to open and/or function properly. This includes things like monitoring tools (e.g. HWiNFO64), some game launchers, system tools (e.g. resource manager), and so on. This is one of those steps, where I must trust that you know what I am talking about, because I can’t possibly list all things that could fall into this category. But don’t worry: If you miss any, it’s not that bad because we can always fix any errors later (keep in mind though, that the fixing of an error might take some waiting…see below).

    We will download a tool, which allows us to run any program that needs admin privileges in order to run properly, and which we will need often. This tool is simply called RunAsTool and was created by Sordum. It can be downloaded here.

    Windows itself can already do something like this by creating a RunAs-Shortcut with a specific command line attached to it (details aren’t necessary, google if you like). But if Windows has this functionality built-in already, why would we use a third-party solution, you might ask? Great question! We will not use the built-in Windows solution, because that would save the admin credentials in the windows credential manager and therefore cause a loophole: With the credentials saved, you could create a RunAsAdmin-Shortcut to a text editor of your choice and reverse parts of this blocking regiment. The RunAs tool by Sordum works differently, however, and therefore doesn’t open that possibility.

    Download and “install” the tool by simply running it. It should be a portable application. Enter the randomly generated password for your admin account, which we made earlier. Then add all programs, which you will need access to later on and which need admin privileges. Create RunAs-Shortcuts for each one on the desktop of your standard user account (NOT the admin account!) or any other place you want them. Congrats, you can now use your programs on your normal account.

    To guarantee access to certain files and/or folders, which you might need, you can navigate to the specific file or folder and grant access to your standard user account by right-clicking on it, going to Properties, then Security, then Edit, then clicking on the name of your standard account, and then checking all the things you might need to do with that file/folder.


    V. Optional: Addon-method
    If you feel like this system is not customized enough, you can choose to use this addon-method. This will take a lot of more time to make it effective, however, if you take the time, your user experience will be a lot better.

    Note: This part of the guide only focusses on the use of Firefox. Why? Because that’s what I personally use and it’s the only thing I know how to do this with. Does it work on other browsers? Maybe. I don’t know. You’ll have to find out how to do it on your own, I guess.

    1. What addon to use
    This “addon method” takes advantage of a browser extension for Firefox called “Blocksite” by Ray (not: “Blocksite” by Blocksite). This addon allows you to block sites, as well as regular expressions. This means, that you can block URL’s, that contain a certain keyword or a combination of keywords. Keep in mind though, that regular expressions can be quite difficult to understand if you are just a regular user like me; it took me days to figure out how that regular expressions stuff works. There are some good explanations on the internet and some “cheatsheets” with the most important things to know. The addon also allows for re-routing to a specific website (e.g. NoFap forum, an encouraging image, etc).

    Note: You have to setup the rules and options (see below) for every user, i.e. what you setup for you admin account will not carry over to your user account and vice versa. I personally didn’t even bother to set anything up for my admin account, since I will not use it anyways. So, make sure you set the addon up at least for your standard user account by logging into that account, opening Firefox, Clicking on Extras, Addons and Themes, Addons, the three little dots, Settings and then changing the settings. Obviously, you'll have to first install the addon itself...duh. I can also recommend to save that option site as a shortcut in case you need it again.

    2. Potential use cases and examples
    a) You can block Google Images WHILE still allowing for the normal google search by blocking a regular expression, which is always part of the image search URL:

    R:tbm=isch (for Google Images)
    R:tbm=vid (for Google Videos)​

    b) You can block specific subreddits while allowing others by blocking the respective URL, e.g. https://www.reddit.com/r/all/. Also you can re-route "bad" subreddits to "good" ones, e.g. reddit.com/r/pornfree.

    c) You can customize your YouTube blocking a lot more (my own primary use case):

    You can use the hosts file method from above to re-route YouTube to the filtered versions offered by Google. However, I personally don’t like that method too much because it overblocks way too much for my taste. With this method you can block by using regular expressions, which you might use as search terms on YouTube. Keep in mind, that this method is A LOT more work to be effective and it also is WAY MORE vulnerable to loopholes (e.g. search terms, which you simply forgot). However, if you take the time and effort, it can really make your user experience MUCH better. Only filter YouTube this way at your own risk.

    If you want to do it like I do (i.e. use the moderately filtered version of YouTube on my phone, while using the addon method on my PC), we will have to use the hosts file to route YouTube back to the unfiltered version (i.e. bypassing CleanBrowsing on purpose) and then start filtering YouTube manually with the addon.

    To do that, open the CMD console again and type “ping youtube.com” (without the “ “) and press enter. The console will print an IP address as well as some other information. Go to the hosts file and add an entry like this (replacing the XXX.XXX.XX.XXX with the IP address you see on the console window):

    XXX.XXX.XX.XXX m.youtube.com
    XXX.XXX.XX.XXX www.youtube-nocookie.com
    XXX.XXX.XX.XXX www.youtube.com
    XXX.XXX.XX.XXX youtube-nocookie.com
    XXX.XXX.XX.XXX youtube.com
    XXX.XXX.XX.XXX youtube.googleapis.com
    XXX.XXX.XX.XXX youtubei.googleapis.com

    If you decide to use this method for YouTube, then you have to do some other things as well in order to close loopholes:

    aa) Block Microsoft Edge (and/or other browsers) for your standard user account. You'll have to do that, because the addon doesn't apply to Edge and therefore you could use it to visit and unfiltered version of YouTube. Edge – unlike other browsers, e.g. Chrome – can’t just be uninstalled easily. But you can easily block it for your standard account:

    Note: You might not have to do this, if you can find a way to force-install the addon on Edge on your own. I personally have never looked for such a way, because I never use Edge and/or other browsers anyways. If you do, I want to encourage you to look for a solution on your own.

    To do this, simply go to C:\Program Files (x86)\Microsoft\Edge\Application\ , right-click on the msedge.exe, go to Properties, then Compatibility, then Change settings for all users, and then check “Run program as Administrator”. After checking this, you will always be asked for the admin password, if you try to open Microsoft Edge from your standard user account. Since you don’t have it, you can’t use Edge anymore as a standard user.


    bb) Block portable browsers:
    Other browsers, which aren’t installed on your PC yet, aren’t really a problem because you will not be able to install software from your standard user account without the admin password. Portable browsers, however, are a bit of a weak spot of this method, because you can’t really block it effectively. Same as with Microsoft Edge, you could download a portable browser and use it to bypass your addon, which only applies for Firefox. Also, portable software doesn’t need to be installed, therefore no admin password would be required.

    To somewhat close this loophole, you could block a regular expression, which hinders you from searching for a portable browser with a search engine. In your addon options, simply add a rule like this:

    Code:
    R:portable
    Note: You can make this regular expression much more complex - and therefore much more useful! - to account for voluntary or unvoluntary spelling errors and such by adding the following regular expression instead. If you don't do this, the addon will block you only if you precisely search for "portable" (but not "portible" for example), which opens loopholes obviously. Therefore, I recommend using something like this instead (you can make it even more complex if you want):

    Code:
    R:p[aeiou]r+[dt]+[aeiou]+[bp]+l


    3. How to make the addon uninstallable

    Okay, so you decided to use the addon-method for something. Good. But how can you make sure, that you just can’t simply uninstall or deactivate the addon? That’s the biggest weak spot of addons generally, right? Yes, but I have a solution for you:

    We will take advantage of the “policies.json” functionality, which Firefox offers. Don't worry, I'll explain everything. To put it simply, we will create a file, which tells Firefox "Do not let anybody deinstall or deactivate this addon!".

    To create such a file, you can use a really helpful Firefox addon called “Enterprise Policy Generator” by Sören Hentzschel to generate a policies.json on your own. As far as I know the addon is available in multiple languages. After you have generated that file, you can uninstall this addon again, if you want. You can also just copy mine here, if you want to make it easier:

    Code:
    {
      "policies": {
        "BlockAboutConfig": true,
        "BlockAboutProfiles": true,
        "BlockAboutSupport": true,
        "DisablePrivateBrowsing": true,
        "DisableSafeMode": true,
        "ExtensionSettings": {
          "{54e2eb33-18eb-46ad-a4e4-1329c29f6e17}": {
            "blocked_install_message": "Are you okay, my dude?",
            "install_url": "https://addons.mozilla.org/firefox/downloads/file/3808527/block_site-0.3.5-an+fx.xpi",
            "installation_mode": "force_installed"
          }
        }
      }
    }
    Copy and paste that text exactly as it is printed here, save it as a .json file with a text editor and name it “policies” (so the file is called policies.json). Then drag and drop that file to C:\Program Files\Mozilla Firefox\distribution. If the folder “distribution” doesn’t exist for you yet, simply create it yourself. Then double-check, that your standard user account doesn’t have privileges to delete or edit that file by right-clicking, going to Properties, then Security and then make sure that only Read, Run and Read are ticked for standard users there. It should already be fine, but in case it isn't, change it. Next time you start your Firefox, it will check if the addon is installed. If it is not, it will force-install it as well as grey-out the uninstall/deactivate buttons, so that you can't uninstall it.


    4. How to configure the addon properly
    In the addon options, I would recommend setting it up like this:

    [Check] Perform blocking on existing pages after initialization
    [Uncheck] Operate on reverse mode (only matching patterns are accessible)
    [Uncheck] Show pause context menu option on browser action's context
    [Uncheck] Show resume context menu option on browser action's context
    [Check] Show "(Un)Block this Page" context menu option on page context
    [Uncheck] Show "(Un)Block this Frame" context menu option on frame context
    [Check] Do not ask for the master password to block a new hostname

    [Uncheck] Resolve the title of blocked pages (uncheck this option to prevent blocked servers from receiving any request)

    Now you just have to set a password for the addon as well by entering in your password in the “Master password” box and then clicking Save Options. If you have trouble, watch this instruction video by the creator of the addon.


    VI. How to safe your passwords properly
    Okay, you’re good to go now in terms of blocking. The only thing, that is left is just to save your passwords somewhere, where you can’t simply access them immediately and where you don't need another person to hold onto them for you. That’s where the following two sites come in:

    https://lockbox.pluckeye.net and/or https://ptimelock.com

    Create an account on one or both of these and create a lockbox with a delay timer.

    Note: The email address and password do NOT have to be random this time. In fact I highly recommend using your regular email address for this in order to remember it for sure. If you forget your login data for this, you are in big trouble if you ever need to change anything.
    DO NOT LOSE YOUR LOGIN DATA TO THIS!

    These sites work on a delay timer basis. This means, that the timer you set has to run out before you can access your passwords. I recommend to NOT set it too long, because in case you messed up some settings or something, you’ll need to wait one delay cyle. I personally have it set to 24 hours, but I think everything between 1-3 days should be fine. I personally wouldn’t set it any longer UNLESS you are 100% sure everything works and you don’t need the password before the delay runs out for whatever reason.

    Note: Just to be safe, I would also recommend to whitelist these sites in your CleanBrowsing settings (if you decided to pay for a subscription). That just ensures, that these sites don’t get blocked by mistake.
     
    grapey123 and (deleted member) like this.
  3. IR254

    IR254 Fapstronaut

    676
    2,233
    123
    C) ANDROID PART
    Note: This part is relatively short, because it's not as complicated as for Windows. Also, a lot of things I said earlier also apply here. So, please refer to the Windows section first if you have any problems or questions.

    I. DNS
    We will use CleanBrowsing DNS again. You can either use their DNS app (availabe on the PlayStore) or setup the DNS manually in the android network settings. I recommend setting it up manually again, because there is a bug (?) sometimes, where the app does weird things after you restart your phone. That's why I suggest setting it up manually.

    II. Pluckeye Browser
    On top of that, I use the Pluckeye webbrowser as my everyday browser on my phone. It is from the same guy, as the Pluckeye software for Windows. It's a webbrowser, that by default disables all pictures and videos (not just porn), but it's also highly customisable. You can either download a pre-made config from other users or create a config on your own, which suits your own needs better. In that sense, it basically acts like the hosts file did for Windows. It takes some time to set it up like you want it, but once you have a solid config, it's a really good user experience.

    III. Lock settings and other things
    Now you only have to block your access to
    a) other browsers and/or apps, which you could use to access porn AND
    b) to settings, which can be used to revert your first two steps.

    That's where an AppLock-App comes in. I personally use an app called "AppLock" from DoMobileLab. I found that one to be the most reliable one in the Playstore. Others I tried didn't work that great. Sometimes they did, sometimes they didn't.

    I recommend locking
    - the PlayStore
    - other browsers you may have installed
    - the Android settings (you must do this, otherwise everything you did before is enirely useless)

    Use a random passcode. Write it down as well.

    IV. Saving your passwords/passcodes
    Please refer to section VI. of the Windows part above.

    _____________________________________________________________________

    Okay. You are done. That’s it. You have blocked your access to porn. Now go do something productive instead ;)
     
    An0nym0use1234 likes this.
  4. IR254

    IR254 Fapstronaut

    676
    2,233
    123
    Placeholder 1
     
  5. IR254

    IR254 Fapstronaut

    676
    2,233
    123
    Placeholder 2
     
  6. HOPE700

    HOPE700 New Fapstronaut

    1
    0
    1
    Did anyone tried this for windows 11?
     

Share This Page