Hi. My school just started issuing devices last year, and they have this Lightspeed spyware on them. Last year I was able to remove it by booting into Linux from a flash drive and moving the files to a separate drive and then back at the end of the year. This year I have heard from sources that they have ways of detecting someone booting from Linux so I am hesitant to do that option. My only other idea is to buy an old laptop off eBay that looks like it and install Linux on it. I could probably get one for about 50€. Does anyone have any cheaper ideas?

Oh also talking to IT isn’t an option.

  • The Hobbyist@lemmy.zip
    link
    fedilink
    arrow-up
    5
    ·
    1 year ago

    Does it have built in storage? If not, could you just buy a second hand SSD, swap it and use that one and put back the original SSD when you return it?

    • HumanPerson@sh.itjust.worksOP
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      1
      ·
      1 year ago

      I believe I experimented with that before. Like I said I don’t want to risk much with this device. Their network is actually solid (it was set up by kids in the networking class not just it) and they would detect it. It did just occur to me that I could remove the Wi-Fi card then remove the files with Linux so that it couldn’t phone home, but I don’t know if it would log the files missing. Do you think that would work?

      • The Hobbyist@lemmy.zip
        link
        fedilink
        arrow-up
        1
        ·
        1 year ago

        It would really depend on the device. It would be possible to phone home, even analyze which files might be missing and report that. Whether that’s how it works or not would depend on the device.

        • HumanPerson@sh.itjust.worksOP
          link
          fedilink
          English
          arrow-up
          1
          ·
          edit-2
          1 year ago

          They didn’t notice it missing last year, but they have made changes. It used to not auto install its extension on librewolf but now it does.

      • CandleTiger@programming.dev
        link
        fedilink
        arrow-up
        1
        ·
        1 year ago

        What’s the consequences for getting caught? Even if they do detect you messing with their install image, what are they going to do about it besides tell you to put it back? Unless they’re going to make you go for psych visits over software removal, it seems to me you may as well just try it and find out.

  • tinyVoltron@lemmy.world
    link
    fedilink
    arrow-up
    20
    arrow-down
    16
    ·
    1 year ago

    Grow up and get your own fucking computer. Don’t be an asshole and fuck with someone’s else’s machine. Do whatever is required to be done on the school machine then put it away and use your own for whatever supersecret spy shit or whatever you need to hide from"The Man". I don’t fuck with my company issued machine. I do my work then use my own machine to surf porn, torrent, or what the fuck. I don’t mess around with the machine that someone’s else paid for. Because I’m not an asshole. Don’t be an asshole.

    • HumanPerson@sh.itjust.worksOP
      link
      fedilink
      English
      arrow-up
      10
      arrow-down
      3
      ·
      1 year ago

      I have my own computer. I use it for exclusively personal things and use my school issued computer exclusively schoolwork. They legally require me to give up my privacy and I disagree with this based on principle alone. Enjoy your porn though.

      • krnl386@lemmy.ca
        link
        fedilink
        arrow-up
        5
        ·
        edit-2
        1 year ago

        Is there an IT policy at your school? I suggest perusing it for 2 reasons:

        1. Understanding the consequences of tampering/tinkering with the spyware.
        2. Understanding how much authority the IT department really has, and whether or not what they’re doing with the spyware constitutes overreach.

        #2 in particular is for your own knowledge/benefit. Since you’re not an employee, but a student, you may have some inherent rights under this policy, which the IT department may be violating.

        • HumanPerson@sh.itjust.worksOP
          link
          fedilink
          English
          arrow-up
          4
          ·
          1 year ago

          Their policy (at least the last time I checked) was all vague rules with whatever punishment they see fit. That is why I just wanna get something identical that is mine. I won’t get on the network but I can use a mobile hotspot and be fine. What rights are you referring to specifically?

          • krnl386@lemmy.ca
            link
            fedilink
            arrow-up
            3
            ·
            edit-2
            1 year ago

            I’m guessing this is a school and not a university? At a university students have more clout/rights, at least on paper.

            In any case, getting your own machine is the way to go. You can run whatever you want on it. You could still (cautiously) use the school network, as long as you use a VPN; basically treat the school network as a “hostile” environment. That’s assuming VPN use is not against the school rules. :)

            • HumanPerson@sh.itjust.worksOP
              link
              fedilink
              English
              arrow-up
              2
              ·
              1 year ago

              I can’t use the network there, I haven’t looked at how they configured it but if I do bring my own device I want to keep it off their network completely because they would realize quickly. I have decent cell service though and can do a mobile hotspot.

    • Jim Bean@lemm.ee
      link
      fedilink
      arrow-up
      6
      arrow-down
      1
      ·
      1 year ago

      You sound like a really decent, well oriented, and kind bloke with a talent for teaching people stuff and giving well-rounded answers. Well done you.

  • Sabre363@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    3
    ·
    1 year ago

    I would say just do it and play dumb if they bring anything up. Or look at some really weird shit and let them spy.

  • das_monk@lemm.ee
    link
    fedilink
    arrow-up
    2
    arrow-down
    1
    ·
    1 year ago

    Is running Linux from a USB drive an option! You don’t have to install anything on the machine itself, and you could run the pen drive os on any machine…

  • SpacemanSpiff@artemis.camp
    link
    fedilink
    arrow-up
    1
    ·
    1 year ago

    Install Linux on a USB stick or live CD. Boot into that OS and do exactly what you did last time.

    1. Unless they have gone into the firmware to prevent booting from anything but the HDD, this will will work and they can’t detect it.

    2. Once you make the changes and boot back into Windows they won’t know either. While the OS is offline their spyware does nothing. Once you boot back into Windows, it can’t run and can’t “call home”.

    As someone else said, they will know eventually that something is broken on your computer, that is, no data from your machine and it becomes a stale object. But they may not automatically believe it was intentionally disabled. You’d be surprised how low compliance numbers need to be in order to be satisfactory, and no security or monitoring solution is flaw-free. They may just blame the software. Many low-level IT admins are prone to this assumption in order to avoid spending a lot of time diagnosing the problem.

    Source: am a computer systems engineer