24h
Day reset
Useful for breaking a single-day pattern. Short enough to test the experience without committing to a multi-day lock.
Solo Pacts
You choose categories, choose a duration, review what becomes hard to change, and confirm with serious friction. The server records the release timestamp so device clock changes do not end the pact early.
The lifecycle
A Solo Pact moves through a fixed lifecycle so the user always knows where they stand and the server always knows what is true.
Pick categories: porn, gambling, drugs, ads/trackers, malware/phishing, proxy/VPN/Tor. Pick a duration. Review what becomes hard to change while the pact is active.
The app shows exactly what will be enforced, what release looks like, and what the cooling-off period is. Confirmation requires deliberate friction: this is not a one-tap toggle.
The server records the start and release timestamps and signs the pact state. The device starts enforcing locally so filtering keeps working when offline.
While the pact is active, blocked attempts increment a counter, tamper events are logged, and offline behavior remains safe. No raw browsing history is collected by default.
Once the server-verified release time arrives, the pact ends cleanly. A user can renew immediately, change settings, or step away. Emergency release paths exist in between.
Server time owns the lock
If the device clock is wound forward, if a profile is reinstalled, or if an app is reinstalled, the server still owns the truth about when the pact may release. Local enforcement falls back to the safe state until it can verify.
Durations
Solo Pact durations are designed for real recovery patterns. Shorter pacts are useful for testing, longer pacts cover real risk windows.
24h
Day reset
Useful for breaking a single-day pattern. Short enough to test the experience without committing to a multi-day lock.
72h
Recovery window
The first MVP target. Long enough to feel real, short enough to commit to without coercion.
7d
Weekly cycle
Aligns with weekly check-ins, partner reports, and real-life accountability rhythms.
30d
Monthly streak
For users who want sustained protection through the highest-risk windows in a typical month.
90d
Quarterly lock
Long-form pact for serious recovery work. Emergency release paths still apply.
Custom
Your duration
Choose a custom period. The same release rules and emergency safeguards apply.
Release paths
Every pact has clear, documented ways to end. None of them are a one-tap escape during a moment of impulse.
The default path. The server-verified release timestamp arrives, the pact ends, the user can renew or change settings.
For Solo users without a co-signer, an emergency unlock is requested and held for 24 hours before it takes effect. The pact stays enforced during the window.
When a co-signer is configured, an unblock request can be approved or declined. Coercive-control safeguards apply: visibility, audit, and abuse release paths come first.
Documented escape routes exist for safety reasons: abusive partners, medical or legal emergencies, and device safety. These paths are auditable and never silent.
Renewing immediately after release is one tap. Extending while a pact is active uses the same friction as creating a new pact.
Closing an account follows the same release rules as a pact. There is no quiet bypass through deletion or reinstall.
Tamper handling
A pact that pretends nothing happened during a tamper attempt is not a pact. SentryPact treats bypass-shaped behavior as data the user and any co-signer should see.