Hi. My school just started issuing devices last year, and they have this Lightspeed spyware on them. Last year I was able to remove it by booting into Linux from a flash drive and moving the files to a separate drive and then back at the end of the year. This year I have heard from sources that they have ways of detecting someone booting from Linux so I am hesitant to do that option. My only other idea is to buy an old laptop off eBay that looks like it and install Linux on it. I could probably get one for about 50€. Does anyone have any cheaper ideas?
Oh also talking to IT isn’t an option.
Yeah, that’s not spyware, it’s called mobile device management and if the school owns it, they have every right to monitor it.
I don’t give a shit. I am required to use it and it has a fucking keylogger. You have to be a complete idiot to say that isn’t spyware.
Sassy. You’re required to use it for school work. No one is forcing you to use it on your own time, get your own personal device for that. Cope.
Hoc cognito, ergo dico hoc. Compartmentalize information that you can; create a new email specifically for school, tape over camera when possible, avoid connecting to your other devices, disconnect the battery when possible. Use other devices for sensitive information.
I only use it for school anyway but would like privacy for schoolwork.
Then go the AdNauseum route. Give them such vast sums of information to sift through that it’s nearly useless to pick through any specific piece. Hotstrings would make the task much more painless, and save you dozens of hours per year once you get used to using them in other capacities.
Removed by mod
If it truly does have a keylogger then that’s really bad as it means they have access to your passwords and any other sensitive data you might type. How certain are you that it includes a keylogger?
Generally security programs like this that do keylogging are context aware and don’t include passwords, plus if it’s a managed device they probably wouldn’t need keylogging to obtain passwords if that was the objective. Significant amount of endpoint protection software will allow for RAM capture, which would have your passwords as well.
Furthering this, if you’re accessing managed applications (say OneDrive or Sharepoint) it’s common to prevent access to a device that doesn’t have all of the monitoring software installed.
You don’t NEED to give a shit. It’s their hardware, they can do as they see fit with it. If you don’t like it then don’t use it. It really is that simple. You can be as indignant as you want, but the answers that many have already given you in this regard will still ring true.
Use it as is, or don’t use it at all. Those are your options. Get over it.
And for fucks sake, stop giving everyone here a bunch of attitude just because you don’t like how the real world is.