Thursday, May 21, 2026

Free Will

 Choosing a course of action from alternatives appears real to me, and I would guess, most others. However, when I think back over the past 80-plus years of my life, I begin to realize that those apparent decisions were mostly, if not totally, a result of influences beyond my control. To begin with, literally, genetics affects 60% of our behavioral tendencies, according to research, by influencing the areas of the brain responsible for planning, resisting impulses, focusing, and the sensitivity of the dopamine receptors (the stronger the receptors, the more likely that cookie will be eaten). Strangely, research shows that genetic influence strengthens with age. When we are children, our behaviors are influenced (more like "controlled") by adults, schedules, rules, and other children. As we age, those influences weaken, and we tend to fall back on our genetic predispositions, environment, experiences, and willpower training.

Saturday, May 2, 2026

Hapara - Blocking Workarounds

 

1. Lock Down Chrome Browser Access

Students often bypass Hapara by using "unmanaged" sessions.

  • Force Sign-In: Ensure "Force users to sign-in to use the browser" is enabled. This ensures your policies (and the Hapara extension) are applied immediately.

  • Restrict Sign-In to Domain: Set the "Restrict sign-in to pattern" to your district's specific domain (e.g., .*@yourdistrict\.org). This prevents students from signing into their personal Gmail accounts to dodge the filter.

  • Disable Guest Mode: Disable Guest Mode at both the Device and Browser levels.

2. Prevent Process Killing (The "End Task" Trick)

Many workarounds teach students to use the Chrome Task Manager to "Kill" the Hapara extension process.

  • The Fix: Navigate to Devices > Chrome > Settings > Users & browsers. Find the Task Manager setting and change it to "Block users from ending processes with the Chrome task manager."

3. Harden Extensions & Developer Tools

Most 2026 exploits use "Inspect Element" or "Bookmarklets" to inject scripts that disable monitoring.

  • Disable Developer Tools: Set "Developer Tools" to "Don't allow" for the student Organizational Unit (OU). If you have coding classes, you can "Allow use except for force-installed extensions," but "Don't allow" is the safest baseline.

  • Block Bookmarklets: Students use "Javascript:" URLs in the bookmark bar to run bypass scripts.

    • Disable Bookmark Editing for students.

    • Hide the Bookmark Bar entirely by policy.

  • Force-Install & Pin: Ensure Hapara Highlights is set to "Force Install + Pin" in the Apps & Extensions settings so students can't hide the icon to pretend it’s broken.

4. Close "Local" Loopholes

  • Block Sensitive Internal URLs: In the URL blocking section, add */html/crosh.html and chrome://settings (or use the "Block sensitive internal Chrome URLs" toggle) to prevent students from accessing the Linux terminal or manual proxy settings.

  • Disable Google Lens & New Tab Buttons: Some recent exploits utilize the Google Lens overlay or the "New Tab" button images to create a browser-within-a-browser. Disable Google Lens and Google Lens Overlay in the Admin Console.

5. Address the Network Layer

If a student is "Offline" in Hapara but still browsing, they might be using a Proxy or VPN.

  • Allowed Network Interfaces: In Devices > Networks > General Settings, ensure "VPN" is NOT an allowed interface.

  • DNS Filtering: If your district uses a DNS filter (like Umbrella or GoGuardian), ensure you are blocking the "Proxy/Avoidance" category. Students constantly find new GitHub Pages (like "Chaos") that host these scripts; blocking the category is more effective than blocking individual URLs.


Administrative Strategy

Since this student has been "sharing" these workarounds, it may be worth a Digital Citizenship intervention. In many districts, demonstrating a bypass is considered a violation of the Acceptable Use Policy (AUP). Addressing it as a behavioral issue can sometimes be more effective than the technical block, as it discourages the "prestige" of finding a new exploit.