Background: School-based online surveillance of students has been widely adopted by middle and high school administrators over the past decade. Little is known about the technology companies that provide these services or the benefits and harms of the technology for students. Understanding what information online surveillance companies monitor and collect about students, how they do it, and if and how they facilitate appropriate intervention fills a crucial gap for parents, youth, researchers, and policy makers.
Objective: The two goals of this study were to (1) comprehensively identify school-based online surveillance companies currently in operation, and (2) collate and analyze company-described surveillance services, monitoring processes, and features provided.
Methods: We systematically searched GovSpend and EdSurge’s Education Technology (EdTech) Index to identify school-based online surveillance companies offering social media monitoring, student communications monitoring, or online monitoring. We extracted publicly available information from company websites and conducted a systematic content analysis of the websites identified. Two coders independently evaluated all company websites and discussed the findings to reach 100% consensus regarding website data labeling.
Results: Our systematic search identified 14 school-based online surveillance companies. Content analysis revealed that most of these companies facilitate school administrators’ access to students’ digital behavior, well beyond monitoring during school hours and on school-provided devices. Specifically, almost all companies reported conducting monitoring of students at school, but 86% (12/14) of companies reported also conducting monitoring 24/7 outside of school and 7% (1/14) reported conducting monitoring outside of school at school administrator-specified locations. Most online surveillance companies reported using artificial intelligence to conduct automated flagging of student activity (10/14, 71%), and less than half of the companies (6/14, 43%) reported having a secondary human review team. Further, 14% (2/14) of companies reported providing crisis responses via company staff, including contacting law enforcement at their discretion.
Conclusions: This study is the first detailed assessment of the school-based online surveillance industry and reveals that student monitoring technology can be characterized as heavy-handed. Findings suggest that students who only have school-provided devices are more heavily surveilled and that historically marginalized students may be at a higher risk of being flagged due to algorithmic bias. The dearth of research on efficacy and the notable lack of transparency about how surveillance services work indicate that increased oversight by policy makers of this industry may be warranted. Dissemination of our findings can improve parent, educator, student, and researcher awareness of school-based online monitoring services.
Promoting a simple unbloated web!
Nowadays, hardware resources of our personal devices are essentially oversized to manage bloated websites. If we incite web designers to return to a lighter web, small devices such as old PC, old smartphones, retro-machines and small boards could be usable.
This is the goal of the smolweb concept.
But what is a bloated website? Two aspects are critical: the size of the code and linked resources downloaded by the browser, and the computing effort to do the layouting by transforming it into absolutely positioned boxes with text and images. Reducing both can make a website “smol”
This site attempts to define what a smolweb is and to give some guidelines for use. It is certainly not the only solution to get unbloated websites, but it will help authors, designers and webmasters who want to build “smolwebsites”. Do not read these recommendations as a bible, this is only what I think to be a good way to build respectful websites for authors, readers, internet bandwidth and hardware.
Scammers have been spotted abusing AI site builder Lovable to mimic trusted brands, steal credentials, drain crypto wallets, and spread malware.
Hackers Hijacked Google’s Gemini AI With a Poisoned Calendar Invite to Take Over a Smart Home. For likely the first time ever, security researchers have shown how AI can be hacked to create real-world havoc, allowing them to turn off lights, open smart shutters, and more."This paper presents implementations that match and, where possible, exceed current quantum factorisation records using a VIC-20 8-bit home computer from 1981, an abacus, and a dog.
We hope that this work will inspire future efforts to match any further quantum factorisation records, should they arise."
Note that this is three attempts to match current quantum computing records, not a single attempt utilizing all three tools.
(The IACR is a legit cryptology organization. Been around for years and years.)
https://eprint.iacr.org/2025/1237.pdf
(h/t @cstross )
so, #sysadmin sorts: chill your quantum computing worries