Open main menu

Linux and Unix Users Group at Virginia Teck Wiki β

Changes

Respondus LockDown Browser

423 bytes added, 04:05, 4 January 2018
no edit summary
by <em>engag[ing] in any activity that might be purposefully harmful to systems or to any information stored thereon...</em>, however
its use is not widespread enough for this to gain any note.
 
There is a further extension to Respondus LockDown, called Respondus Monitor
<ref>http://respondus.com/products/monitor/</ref> that allows the proctor to spy on users through their webcam.
==Running the Software==
A version for iOS (iPad-only) is also available, as well as a version for centrally managed Chromebooks for education (k-12).
 
== Analysis ==
Only cursory analysis has been done thus far, as the author of this article doesn't have a native windows box to run Respondus on. It appears that on launch, it first connects to an unencrypted http server running in AWS, presumably to check if the version is current, then it checks if it is in a virtualized environment.
==Other Notes==
* What kind of protocol does it use to authenticate that it is respondus
** A Kerberos-like protocol would be optimal, but I'd be surprised if they did it
* Does it use Free Software? Can we get the GPLed code?
* Does the binary do any integrity checks?
* Does qemu-only emulated devices adequately obfuscate that it runs in a VM?Doesn't seem to
==References==
<references/>
[[Category:Campus bugs]]
[[Category:Software]]
[[Category:Proprietary course software]]
Anonymous user