Glossary
The canonical vocabulary of assessment security.
A new category of threats demands a new category of definitions. This is the reference the assessment industry will cite — for the tools that defeat legacy proctoring, the architectures that replace it, and the words buyers and platforms need to speak the same language.
What we're up against
Threat landscape
The attacker vocabulary. Named accurately so defenders can name the thing they're defending against.
Invisible AI Overlay
Transparent heads-up display that streams AI answers only to the candidate's eyes.
Read definition →Cluely
The flagship invisible-overlay product that normalized real-time AI assistance in interviews.
Read definition →On-Device LLM Cheating
Offline language models running locally — no network traffic for detection tools to see.
Read definition →Fraud-as-a-Service
The commercial ecosystem of subscription cheating tools, proxy rings, and coaching services.
Read definition →Proxy Ring
Organized paid services that send a professional ringer to sit the exam in the candidate's place.
Read definition →The category we define
Defense architecture
The architectural terms for a new class of exam security. These are category-defining — Aiseptor is the canonical example.
Network-Layer Proctoring
Controlling what the candidate device can reach — not what a single browser window can do.
Read definition →Zero-Trust Exam Security
Assume the candidate device is hostile. Verify the network path, not the candidate.
Read definition →Ephemeral Enclave
A security boundary that exists only for the session and leaves no footprint behind.
Read definition →Default-Deny Architecture
Block everything by default. Allow only what the exam explicitly requires.
Read definition →The category we live in
Industry
The vocabulary of remote assessment. Defined neutrally, so buyers and partners can have the same conversation.
Lockdown Browser
Application-layer exam tool — controls one browser window. Aiseptor replaces this layer.
Read definition →Behavioral Detection Proctoring
Webcam and gaze analytics that infer cheating from candidate behavior — with architectural limits.
Read definition →BYOD Assessment
Bring-your-own-device exams: the candidate supplies the hardware, the risk comes with it.
Read definition →