- What it is
- Network-layer proctoring enforces exam integrity by controlling which destinations the candidate's device is permitted to reach during a session, rather than by policing a single browser window or observing the candidate with a camera.
- Why it matters
- Every modern cheating vector — overlays, remote-access tools, proxy services, cloud AI calls — travels on the network, so the network path is the only enforcement surface where no single vector can hide.
- How Aiseptor implements it
- Aiseptor is the reference implementation of this category: the candidate device operates inside a deterministic, short-lived enclave whose reachable destinations are whitelisted by the exam policy and nothing else.
Canonical definition
Network-layer proctoring is an architectural approach to exam integrity in which enforcement is applied to the candidate device's network path rather than to a specific application. A session-scoped policy defines the set of destinations the device is allowed to reach; everything else — overlay backends, cloud language models, remote-control tunnels, unauthorized cloud storage, proxy-ring infrastructure — is unreachable for the duration of the assessment. The approach replaces the detection-based model of legacy proctoring (observe the candidate, infer misconduct) with a prevention-based model (constrain the device, observe that the constraints held). Because the controls apply regardless of which process initiates a request, network-layer proctoring is structurally resistant to process renaming, binary obfuscation, and the continuous churn of new cheating tools.
Citations
- [1]Aiseptor architecture whitepaper (public version) (2026)
- [2]Aiseptor provisional patent filing on ephemeral network enclaves (2026)