Hi. My school just started issuing devices last year, and they have this Lightspeed spyware on them. Last year I was able to remove it by booting into Linux from a flash drive and moving the files to a separate drive and then back at the end of the year. This year I have heard from sources that they have ways of detecting someone booting from Linux so I am hesitant to do that option. My only other idea is to buy an old laptop off eBay that looks like it and install Linux on it. I could probably get one for about 50€. Does anyone have any cheaper ideas?

Oh also talking to IT isn’t an option.

  • tinyVoltron
    link
    61 year ago

    Grow up and get your own fucking computer. Don’t be an asshole and fuck with someone’s else’s machine. Do whatever is required to be done on the school machine then put it away and use your own for whatever supersecret spy shit or whatever you need to hide from"The Man". I don’t fuck with my company issued machine. I do my work then use my own machine to surf porn, torrent, or what the fuck. I don’t mess around with the machine that someone’s else paid for. Because I’m not an asshole. Don’t be an asshole.

    • @[email protected]OP
      link
      fedilink
      English
      71 year ago

      I have my own computer. I use it for exclusively personal things and use my school issued computer exclusively schoolwork. They legally require me to give up my privacy and I disagree with this based on principle alone. Enjoy your porn though.

      • @[email protected]
        link
        fedilink
        5
        edit-2
        1 year ago

        Is there an IT policy at your school? I suggest perusing it for 2 reasons:

        1. Understanding the consequences of tampering/tinkering with the spyware.
        2. Understanding how much authority the IT department really has, and whether or not what they’re doing with the spyware constitutes overreach.

        #2 in particular is for your own knowledge/benefit. Since you’re not an employee, but a student, you may have some inherent rights under this policy, which the IT department may be violating.

        • @[email protected]OP
          link
          fedilink
          English
          41 year ago

          Their policy (at least the last time I checked) was all vague rules with whatever punishment they see fit. That is why I just wanna get something identical that is mine. I won’t get on the network but I can use a mobile hotspot and be fine. What rights are you referring to specifically?

          • @[email protected]
            link
            fedilink
            3
            edit-2
            1 year ago

            I’m guessing this is a school and not a university? At a university students have more clout/rights, at least on paper.

            In any case, getting your own machine is the way to go. You can run whatever you want on it. You could still (cautiously) use the school network, as long as you use a VPN; basically treat the school network as a “hostile” environment. That’s assuming VPN use is not against the school rules. :)

            • @[email protected]OP
              link
              fedilink
              English
              21 year ago

              I can’t use the network there, I haven’t looked at how they configured it but if I do bring my own device I want to keep it off their network completely because they would realize quickly. I have decent cell service though and can do a mobile hotspot.

  • The Hobbyist
    link
    fedilink
    51 year ago

    Does it have built in storage? If not, could you just buy a second hand SSD, swap it and use that one and put back the original SSD when you return it?

    • @[email protected]OP
      link
      fedilink
      English
      11 year ago

      I believe I experimented with that before. Like I said I don’t want to risk much with this device. Their network is actually solid (it was set up by kids in the networking class not just it) and they would detect it. It did just occur to me that I could remove the Wi-Fi card then remove the files with Linux so that it couldn’t phone home, but I don’t know if it would log the files missing. Do you think that would work?

      • @[email protected]
        link
        fedilink
        11 year ago

        What’s the consequences for getting caught? Even if they do detect you messing with their install image, what are they going to do about it besides tell you to put it back? Unless they’re going to make you go for psych visits over software removal, it seems to me you may as well just try it and find out.

      • The Hobbyist
        link
        fedilink
        11 year ago

        It would really depend on the device. It would be possible to phone home, even analyze which files might be missing and report that. Whether that’s how it works or not would depend on the device.

        • @[email protected]OP
          link
          fedilink
          English
          1
          edit-2
          1 year ago

          They didn’t notice it missing last year, but they have made changes. It used to not auto install its extension on librewolf but now it does.

  • Sabre363
    link
    fedilink
    English
    31 year ago

    I would say just do it and play dumb if they bring anything up. Or look at some really weird shit and let them spy.

  • das_monk
    link
    fedilink
    11 year ago

    Is running Linux from a USB drive an option! You don’t have to install anything on the machine itself, and you could run the pen drive os on any machine…

  • SpacemanSpiff
    link
    fedilink
    11 year ago

    Install Linux on a USB stick or live CD. Boot into that OS and do exactly what you did last time.

    1. Unless they have gone into the firmware to prevent booting from anything but the HDD, this will will work and they can’t detect it.

    2. Once you make the changes and boot back into Windows they won’t know either. While the OS is offline their spyware does nothing. Once you boot back into Windows, it can’t run and can’t “call home”.

    As someone else said, they will know eventually that something is broken on your computer, that is, no data from your machine and it becomes a stale object. But they may not automatically believe it was intentionally disabled. You’d be surprised how low compliance numbers need to be in order to be satisfactory, and no security or monitoring solution is flaw-free. They may just blame the software. Many low-level IT admins are prone to this assumption in order to avoid spending a lot of time diagnosing the problem.

    Source: am a computer systems engineer