Hi. My school just started issuing devices last year, and they have this Lightspeed spyware on them. Last year I was able to remove it by booting into Linux from a flash drive and moving the files to a separate drive and then back at the end of the year. This year I have heard from sources that they have ways of detecting someone booting from Linux so I am hesitant to do that option. My only other idea is to buy an old laptop off eBay that looks like it and install Linux on it. I could probably get one for about 50€. Does anyone have any cheaper ideas?

Oh also talking to IT isn’t an option.

  • PeachMan@lemmy.one
    link
    fedilink
    arrow-up
    27
    arrow-down
    1
    ·
    1 year ago

    Don’t tamper with hardware that somebody else owns. If you get caught, you could be fined a lot more than 50€ and expelled. School administrators often like to “make an example” of kids that they think are “hackers” even if you’re just booting Linux from USB. They don’t understand the difference between that and real hacking, so don’t risk it.

    You can only achieve true privacy on hardware that you own. A cheap laptop to boot Linux isn’t a bad idea.

      • PeachMan@lemmy.one
        link
        fedilink
        arrow-up
        5
        ·
        1 year ago

        Absolutely yes, if you buy hackable and repairable hardware you can do whatever you want with it. Especially if you install software on it that is FOSS.

        • Llewellyn@lemm.ee
          link
          fedilink
          arrow-up
          4
          arrow-down
          1
          ·
          edit-2
          1 year ago

          By my question I mean:
          Any hardware is made by some other people. Any hardware is work under a firmware, made by other people.

          All that is a) regulated by licenses b) never can be trusted fully to work as you think it should work. Even if it based on open source - due to the “problem of untampered compiler”.

          If you have no total control over your hardware, can you say you truly own it?
          What percent of control is acceptable? How to measure it?

          • MajorHavoc@lemmy.world
            link
            fedilink
            arrow-up
            3
            ·
            1 year ago

            It depends how far down the rabbit hole you’re willing to go.

            Today you can make sure the source code is truly what you intend, by running Linux on PC and GrapheneOS on Android. You might not have the ability to audit those, but others (like me) do, and are doing so.

            Whether you believe us or not is more philosophy - but join us in the rabbit hole and see what you find. You’ll find detailed public technical discussions of security and privacy. You can find some of that for closed software and hardware too, but we can never do as good of a job in that discussion without the source code.

            If you want open auditable hardware, you can stick to Raspberry Pi.

            There’s an open hardware project for phone too, but it’s more of a proof-of-concept, today, as far as I understand.

            If you want the TL;DR version of where I landed - I posted this from a Pixel running GrapheneOS.

            • Llewellyn@lemm.ee
              link
              fedilink
              arrow-up
              1
              ·
              edit-2
              1 year ago

              Exactly. There could not be true / full ownership of hardware.
              And yet that’s fine for me.

              Now about that:

              Today you can make sure the source code is truly what you intend, by running Linux on PC and GrapheneOS on Android. You might not have the ability to audit those, but others (like me) do, and are doing so.

              Even in that case you can never be sure what a compiler did with the code. You can say: go look at the code of that compiler. But then how can I be sure it’s code had been compiled without malicious modifications. And so on.

              • MajorHavoc@lemmy.world
                link
                fedilink
                arrow-up
                1
                ·
                edit-2
                1 year ago

                You can compile your compiler from source.

                Edit: Here’s how: https://www.linuxfromscratch.org/

                Edit 2: I know you can hear the rabbit hole calling to you. Join us. Follow the rabbit trail.

                But seriously, it’s cool, you’re curious about it, and the pay from the jobs it leads to tends to be pretty great.

              • MasterBlaster@lemmy.world
                link
                fedilink
                arrow-up
                3
                arrow-down
                1
                ·
                1 year ago

                This reminds me of the times i and my friend had deep philospohical discussions… at 2am. During a weekend party, while drunk, in highschool.

                Anyway, don’t go down any rabbit holes in which you can’t see the bottom. Walk away. While whistling, if it helps.

          • diamond_shield@reddthat.com
            link
            fedilink
            arrow-up
            1
            ·
            edit-2
            1 year ago

            As of August 2023, the best way to avoid the problem of

            untampered compiler

            AFAIK Is using an MNT Reform With GNU Guix as its OS, I really liked this article “The Full-Source Bootstrap: Building from source all the way down”. This approach could, potentially, solve the problem of the untampered compiler. Damn, maybe it already does.

            As for the MNT Reform, the only thing I’m not sure is open is the actual processor firmware, but the schematics for its usage are available and even the Wifi firmware is open, so there remains the problem of actually verifying the hardware you get is actually the hardware you ordered, but that is a bit more complicated I think.

            • Llewellyn@lemm.ee
              link
              fedilink
              arrow-up
              3
              ·
              1 year ago

              To be sure you should build processor from a scratch and then write your own compiler directly in machine code.

  • JonEFive@midwest.social
    link
    fedilink
    arrow-up
    26
    ·
    1 year ago

    Know your school handbook and acceptable use policy inside and out. Same with any other published guidelines they provide. My bet is that their AUP says something about not circumventing their security and monitoring tools. Booting into a live OS would certainly fall into that category. But knowing what the rules actually say is probably the first thing you should do since you don’t own the hardware or network. From there, you can decide how far you really want to go and if there are any defenses or loopholes in the rules.

    Getting your own hardware is probably your best option in this case if you can do so.

  • goryramsy@kbin.social
    link
    fedilink
    arrow-up
    12
    arrow-down
    4
    ·
    1 year ago

    I work for a school and I provision these types of devices. You do not want to modify or change anything about them, as it probably breaks your acceptable use policy. If they allow you to bring your own device, then do that. But do not change the device they give you in any manner. Just don’t use school property for things you want to be private. It works the exact same way with anything owned by any organization you may work for in the future. They own the device, they set the terms. And your excuse of ‘it does not break policy’ or ‘it is not against the law’ is ridiculous, as policy is intentionally broad for this reason, and the law requires you to not interrupt normal classroom activities. If the school lets you, bring your own device. Otherwise, tough luck, seems like you won’t be able to play your games.

    • zwekihoyy@lemmy.ml
      link
      fedilink
      arrow-up
      6
      ·
      1 year ago

      i would like to add on to this, do not bring your own device, just simply keep school/work and personal stuff entirely separate. simple as that.

      all work and schools that allow you to use a personal device that I’m aware of will require you to have whatever software for surveillance that they have on provisioned devices, you’ll likely end up messing up and leaking something private, and it just takes up storage space.

      it’s the organization’s device, they can put whatever nonsense they want on it, just be sure that you only ever use accounts from them on the device. never a personal account of any kind.

    • triplenadir@lemmygrad.ml
      link
      fedilink
      arrow-up
      5
      arrow-down
      6
      ·
      1 year ago

      trivialising a student’s desire for privacy as being about playing videogames is a lot more ridiculous than anything the OP said.

      maybe rethink your uncritical support for surveillance, and either organise with your coworkers to make your school’s policies more respectful of its students, or find a less unethical job.

      • goryramsy@kbin.social
        link
        fedilink
        arrow-up
        3
        ·
        1 year ago

        uncritical support for surveillance

        We are, by law, required to keep this information. However, unlike many other schools, we have a byod policy that allows students to use their own device to essentially bypass this ‘surveillance’.

        • triplenadir@lemmygrad.ml
          link
          fedilink
          arrow-up
          1
          arrow-down
          1
          ·
          1 year ago

          pressing X to doubt that you only help keep information on students that you’re required to by law.

          and, something being legally required doesn’t mean you need to enthusiastically support it in an online discussion.

          • goryramsy@kbin.social
            link
            fedilink
            arrow-up
            2
            arrow-down
            1
            ·
            edit-2
            1 year ago

            pressing X to doubt that you only help keep information on students that you’re required to by law.

            If we were to store private information or data that falls outside the boundaries of the law, we would be subject to arrest for unlawfully retaining children’s data. I want to emphasize to both you and OP that schools are legally obligated to store this information, and that I strongly advise against tampering with a device owned by the school.

            • triplenadir@lemmygrad.ml
              link
              fedilink
              arrow-up
              1
              arrow-down
              1
              ·
              1 year ago

              this just sounds even less believable: you’re in a jursidiction where the amount of data you have to store on students is exactly specified, and you’re liable to prosecution for storing any single piece of data less or more? I would appreciate extraordinary evidence for this extraordinary claim.

              anyway, even if that’s true, you could be using your knowledge to help privacy-conscious students like OP, instead of throwing a rulebook at them and casting aspersions about their motivations. I return to “reconsider your views, and the impact of your job”.

  • Pandantic [they/them]@midwest.social
    link
    fedilink
    English
    arrow-up
    3
    ·
    1 year ago

    Hate to break it to you, but jobs are doing this as well. I am a teacher, and we just got GoGuardian for students, but it has been watching / blocking things for teachers since I started a couple years ago. If you have a work-issued device, your work will most likely monitor it, and same goes with school-issued devices. I get that you want to hack it and do what you want, but that could get you fired some day.

    • jsdz@lemmy.ml
      link
      fedilink
      arrow-up
      1
      ·
      1 year ago

      that could get you fired some day.

      Among other ways it might make you better off, a tendency to boot linux on school-issued devices could also very much help get you hired some day. Although perhaps not in the education system. Seeing a teacher discourage it is even more depressing than seeing a student fear he’ll be punished for it. So long as you’re not breaking any laws, it seems like a fine idea.

      • HumanPerson@sh.itjust.worksOP
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 year ago

        I like this take. I got into a programming class after telling the teacher about a program I had previously gotten an in school suspension for writing. It recursively started itself and used a ton of resources. It was just goofy and the it dept. called it a virus.

      • Pandantic [they/them]@midwest.social
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 year ago

        I don’t discourage it so much as I’m giving this person a warning. Also, do you know why they put up those systems? To protect their devices, and to block kids from things they legally should not be on. I’ve seen so many kids (and adults) download viruses, spyware, adware, etc on their computer just because they wanted a “cool” mouse pointer, wallpaper, or other feature. Not that I think op will do something stupid like this, but this is what they’re protecting their computers from.

  • Melody Fwygon@lemmy.one
    link
    fedilink
    arrow-up
    3
    ·
    1 year ago

    They can’t detect if you boot into Linux; but they can detect the presence of external storage devices and scan their contents. It is best if you do not plug in your LiveUSBs or disks while the system is [ONLINE] (Meaning while the device is booted into any default operating system)

    Chances are if your hardware has not changed; the capabilities have also not changed. I do however have a few tips for you:

    • DO NOT MODIFY THE DEFAULT OS OR SPYWARE! It sounds like they are now monitoring the files for the software and will now notice if you have disabled it; as your machine will probably be sending heartbeats to a centralized server. You must accept this spyware when operating the machine as intended to interface with your school environment; but you can limit yourself to submitting schoolwork only on it
    • Boot into a Live(CD/USB/Media) environment of Linux with Persistence. Google it. They can’t detect this without BIOS tampering.
    • Do Not plug your Live Media into the system when booted into it’s default mode. Your drives are probably being scanned.
    • Keep a separate media storage device for storing your documents and such.
    • You can boot into your Linux key to work on school things and browse the web privately. Remember though that you are [OFFLINE] and may be unable to access the school network and will be required to save your work on a different piece of media, shut back down and boot into the default OS again to submit your work.
    • You may be unable to complete assignments in Linux [OFFLINE] that require you to respond to questions interactively [ONLINE] or otherwise require that you be interactively [ONLINE].
    • m-p{3}@lemmy.ca
      link
      fedilink
      arrow-up
      2
      ·
      1 year ago

      They can’t detect if you boot into Linux

      It depends what they use for monitoring. If they use Intel vPro then they can technically take over from any operating systems since it runs at the TPM/firmware level.

      • Melody Fwygon@lemmy.one
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 year ago

        I’m assuming that unless told otherwise; they have no such capability in the BIOS. It IS probably a public school and IT department that isn’t that clever/resourced.

        • HumanPerson@sh.itjust.worksOP
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          1
          ·
          edit-2
          1 year ago

          They are very dumb. I am not just being mean I met the head of IT personally and he is an idiot, but students from some of the computer classes were responsible for some of the configuration, meaning some competent people looked at it.

          Edit: The bios was password protected last year so it isn’t stock at least.

          • thisisnotgoingwell@programming.dev
            link
            fedilink
            arrow-up
            3
            arrow-down
            3
            ·
            edit-2
            1 year ago

            Something tells me your intentions aren’t innocent(you want to be able to act maliciously at school or on the school network), or you have an overinflated sense of ego, the head of IT likely didn’t give two shits about explaining anything to some brat. You’re going to have to face some harsh realities pretty soon. Expecting digital privacy on a school issued device on the school network is asinine thinking.

            • HumanPerson@sh.itjust.worksOP
              link
              fedilink
              English
              arrow-up
              4
              ·
              1 year ago

              I wanted to do goofy stuff last year like the 4 line script that only uses tons of resources, but I have no intention to be malicious in any way. They now have a whitelist instead of a blacklist for website blocking, meaning many educational sites are blocked by accident. My teacher’s website was blocked for most of last year. We are required to use MS Office even though it takes 3-4 times as long as LibreOffice to load. I don’t want to be hackerman or to play csgo in class, I just want basic functionality on the computer I have to use.

              • Johanno@feddit.de
                link
                fedilink
                arrow-up
                1
                ·
                1 year ago

                Well your easiest option would be to buy the another laptop.

                Or you could just use a different hard drive and install Linux. (and switch back the old drive once you need to give it back)

                But if the bios is password locked I don’t know what they might block in there

              • thisisnotgoingwell@programming.dev
                link
                fedilink
                arrow-up
                1
                arrow-down
                1
                ·
                1 year ago

                Is this a school owned device? Goofy 4 line script that uses tons of resources, so that script that unnecessarily and intentionally taxes the laptops hardware, purely innocent right? Any chance why they might not want you to do that?

                That’s pretty standard across any respectable industry. You’re given suitable alternatives, if everyone could use whatever applications they wanted then it would be a nightmare.

                • HumanPerson@sh.itjust.worksOP
                  link
                  fedilink
                  English
                  arrow-up
                  3
                  ·
                  1 year ago

                  It unnecessarily taxes the cpu. CPUs don’t die except for cracked dies and improper thermal solutions. Do you think that was really going to do anything to it? Also it isn’t like I can’t do that already, so all their shit does is make it harder to do legitimate work.

  • skymtf@pricefield.org
    link
    fedilink
    arrow-up
    3
    ·
    1 year ago

    Hmmm not sure if its any different now but I used to bring my own iPad mini and do my work on that. I’m sure its different now.

  • OsrsNeedsF2P@lemmy.ml
    link
    fedilink
    arrow-up
    2
    ·
    1 year ago

    Not using the school given device is the best course of option unfortunately. Second hand ones are good, but the specs will be pretty bad

  • thisisawayoflife@lemmy.world
    link
    fedilink
    arrow-up
    2
    ·
    1 year ago

    Bring your own device. Run it on your own wireless Internet connection (cellular). Never attach it to any private (read: school) resources aside from a power plug. Do not use corporate cloud (Amazon, Microsoft, Apple, etc). When you need to transfer assignments from personal computer to school computer, use your own cloud service like Nextcloud, or use GPG to encrypt the payload and send it to your school email address, which you can decrypt and send to your teacher. It will then be public and you should assume the teacher is techdumb and will put it on compromised systems like Apple, Microsoft, etc.

  • oo1@kbin.social
    link
    fedilink
    arrow-up
    2
    ·
    1 year ago

    are you in europe/EU? (judging by currency symbol)
    what about talking to the relevant GDPR authority?

    there should be a clear route of complaint.

    start by submitting a subject access request
    " what infomation do you hold about me, or that you can link to me?"
    “give me a copy”
    " what procesing are you doing with it"
    " have you shared it? with whom?"

    so this process in iself should reveal all processing that they think youve consented to - gives you a basis to challenge.

    if they lie to you, that’s anothet offence.

  • Steamymoomilk@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    1 year ago

    When I was in high school I had my school laptop and my Linux laptop, if I needed to do work I would download the file on the school laptop and use a USB to move it to my Linux laptop to work on it. It was tedious but was the only way as we had latitude 2 in 1s that had a soldered in ssd. So I couldnt swap hdd, I ran zorinOS on a Lenovo t450 and it worked really well for school work

    —edit Light speeds a bitch

  • §ɦṛɛɗɗịɛ ßịⱺ𝔩ⱺɠịᵴŧ@lemmy.ml
    link
    fedilink
    arrow-up
    3
    arrow-down
    2
    ·
    edit-2
    1 year ago

    Disregard whatever you’ve heard about installing Linux on the device, find the agreement given with it and see what it says. If no reference is made to doing your thing then returning it with the same setup, I’d say you’re in the clear. I’d bet the agreement covers damage, lost and stolen aspects plus returning it good condition, yet if you reinstall the software like it was provided they’d have to be very explicit about not loading Linux. If they do, you could use linux on a USB without installation. This could get you off the spyware while not breaking the rules if they are in writing.

    • skankhunt42@lemmy.ca
      link
      fedilink
      arrow-up
      1
      ·
      1 year ago

      Basically this. I’d just buy a used disk, swap them out and install Linux. That or use a USB.

      When it comes time to return it, put the old hard drive in it and return it. I can’t think of a way for them to tell you did this aside from the lack of logs they keep from trying to track you.