The myriad attractions of the online world are constantly seducing our students’ attention, making them vulnerable to online harms and endangering your duty of care. That’s exactly why network filters were created. But as students spend more and more time on their devices - to the point where nearly half say they’re online “almost constantly” - they’ve also discovered more and more ways to subvert the system.
We’ll look at each of these common hacks in a moment. But first, it’s important to understand that they present a two-fold challenge to schools: technological and educational.
To unpack that, suppose you had a problem with students sneaking out of school at recess. You could respond technically: for example, by constructing better fencing and security around your campus boundaries. Or, you could respond in an education-directed way: raising awareness about safety, responsibility and values throughout your community.
The ideal solution would cover both bases: physically blocking escape routes AND educating your community about respecting school rules and boundaries.
It’s a useful analogy because when students bypass network filters, they abscond - granted, virtually. And they are also breaking the rules and boundaries set up to keep them safe and focused.
Our free practical whitepaper is designed to explain how Independent and Catholic schools can break down the invisibility cloak and guide their students to greater awareness and understanding.
The most popular loopholes students exploit to get around network filtering include:
This time-honoured student hack involves connecting to the internet using outside servers. It sounds complicated but is extremely easy to do, as a simple Google search for “proxy” will attest.
Virtual Private Networks encrypt IP addresses to trick the network and bypass its settings. Recent surveys show anywhere from a third to three quarts of high school students routinely use VPNs to access school WiFi without restrictions.
A whole world of browser extensions can enable students to browse anonymously, encrypt data and disguise IP addresses.
This is basic but effective and a no-brainer when staff make little effort to conceal teacher/admin passwords or use easily guessed ones.
Versions of the popular browser can be downloaded to a flash drive and simply plugged into a school device for unrestricted and undetected access.
With the ownership of 4G/5G-enabled smartphones nearly universal in our secondary schools, hotspotting to school devices is a routine way for students to hop off the network and roam the online world without a leash.
To find out more or arrange a demo please contact us. Our team of experts are waiting to help.
Sign up for our newsletter to get all the latest product information.