Back to Elite Projects
Cybersecurity / Electron

The "Interview Shield" App

Stop the Cheaters. Protect the Honest. Get Paid.

The Problem (Why this exists)

Imagine you are a recruiter in 2026. You are interviewing a "Genius" developer on Zoom. But wait... his eyes are darting around rapidly. He is clearly reading an AI-generated script from an invisible second screen! Or worse, someone else entirely is talking for him from a hidden laptop just out of frame.

This is "Proxy Interviewing," and it is a multi-million dollar fraud crisis in the tech sector.

The Simple Idea

Instead of building another generic website, you build a Native Desktop App (similiar to Discord or Valorant Vanguard).

When the tech interview starts, the app "Freezes" the candidate's computer:
❌ You can't open Google Tabs.
❌ You can't trigger ChatGPT.
❌ You can't use Screen-sharing apps like AnyDesk.

It’s just You vs. The Recruiter.

SCANNING PROCESSES:

How it Works (The 3 Magic Layers)

01

The "Ghost Scanner" (Background Check)

The moment the app executes, it scans the OS for "Cheat Apps." If it explicitly finds AnyDesk or Discord active in the RAM, the video feed refuses to connect. Student Logic: It’s a digital bouncer checking IDs.

02

The "Window Lock" (Anti-Alt+Tab)

Once the interview begins, the Electron app takes over the fullscreen display. If the user successfully Alt+Tabs to a hidden browser, the app violently alerts the recruiter dashboard. Student Logic: Kiosk Mode enforcement.

03

The "Pure Signal" (WebRTC)

The app generates a direct peer-to-peer WebRTC line between the candidate and recruiter. Zero lag. Smart Feature for Portfolios: Add an AI Sound detection library. If the app detects "whispering" from a hidden second person in the room, it flags the recording.

The Technical Architecture

To execute this, students need to step out of "Web Browsers" and interact directly with the OS.

1. Web-to-App Magic (Deep Linking)

To launch this app via a web portal link securely (e.g. myportal://join/12345), you register a Custom Protocol in Electron utilizing app.setAsDefaultProtocolClient('myportal'). This proves you understand local OS bridge integrations.

2. The "Nuclear Option" (Killing Tasks): The very moment the "JOIN" button is clicked, your app must aggressively cleanse the PC of unauthorized software to protect the recruiter's integrity.

const { exec } = require('child_process');

// Force close highly utilized cheating vectors on Windows OS via the command line layer
exec('taskkill /F /IM chrome.exe');
exec('taskkill /F /IM discord.exe');
exec('taskkill /F /IM anydesk.exe');

Why This Secures High-Paying Offers

When a student opens their laptop and demonstrates this desktop application to an interviewer, they aren't just showing standard web code. They are explicitly proving:

The Exact Script to Say in an Interview

When you finally get an interview at a major tech company, they are going to ask you to "Walk me through a project." Do not just read the bullet points on your resume. Use this exact psychological framework to sound like a Senior Engineer solving a massive business problem:

"Most of my classmates built simple To-Do list websites, but I wanted to build something that solves an actual multi-million dollar problem in the Corporate HR world right now: Proxy Interviewing Fraud."

"I built a native Electron desktop application that acts as a secure lock-down browser for technical interviews. The moment a candidate joins the video call, my software utilizes native OS command line executions—like 'taskkill' on Windows—to aggressively scan the system RAM and force-close known cheating vectors like Discord, AnyDesk, or hidden Chrome windows."

"By taking the video stream directly out of the easily-manipulated web browser and forcing the candidate into a native desktop application, I was able to mathematically guarantee that the person talking on the screen is the only person in the room answering the technical questions."

Frequently Asked Technical Questions (FAQ)

Q: Why did you choose Electron instead of a standard React Website?

Because standard websites do not have deep-level access to the computer's Operating System. A browser tab cannot see if you have an invisible screen-sharing app running in the background. By building a native desktop app using Electron, the software gains direct access to the computer's active processes, allowing us to build a true 'Zero Trust' environment that completely stops fraudulent behavior.

Q: How does the software handle false positives? What if it accidentally closes a harmless app?

This is a massive issue in enterprise security architecture. To prevent the software from destroying a user's computer, we hardcoded an explicit 'Blacklist Array' containing only the executable process names of known cheating software (like 'anydesk.exe' and 'discord.exe'). It does not touch essential background services, meaning the OS remains 100% stable while running the interview.

Q: Is it legal to forcefully close applications on someone else's computer?

Yes, provided the candidate signs a digital User Agreement (EULA) before launching the software. This is the exact identical legal framework utilized by anti-cheat software inside major video games like Valorant or League of Legends. You explicitly grant the app permission to verify your local system integrity before you are permitted to join the secure server.

Q: How does the video feed remain stable without severe lag?

Instead of trying to route heavy 1080p video packets through a centralized bottleneck server, the app is engineered to utilize a WebRTC Peer-to-Peer pipeline. This allows the recruiter and the candidate to stream video data directly to each other locally, stripping out intermediate server costs and radically dropping latency to nearly zero milliseconds.

This architectural blueprint is provided for educational engineering purposes.