Back to Elite Projects
Cybersecurity / Electron

The "Interview Shield" App

Stop the Cheaters. Protect the Honest. Get Paid.

The Problem (Why this exists)

Imagine you are a recruiter in 2026. You are interviewing a "Genius" developer on Zoom. But wait... his eyes are darting around rapidly. He is clearly reading an AI-generated script from an invisible second screen! Or worse, someone else entirely is talking for him from a hidden laptop just out of frame.

This is "Proxy Interviewing," and it is a multi-million dollar fraud crisis in the tech sector.

The Simple Idea

Instead of building another generic website, you build a Native Desktop App (similiar to Discord or Valorant Vanguard).

When the tech interview starts, the app "Freezes" the candidate's computer:
❌ You can't open Google Tabs.
❌ You can't trigger ChatGPT.
❌ You can't use Screen-sharing apps like AnyDesk.

It’s just You vs. The Recruiter.

SCANNING PROCESSES:

How it Works (The 3 Magic Layers)

01

The "Ghost Scanner" (Background Check)

The moment the app executes, it scans the OS for "Cheat Apps." If it explicitly finds AnyDesk or Discord active in the RAM, the video feed refuses to connect. Student Logic: It’s a digital bouncer checking IDs.

02

The "Window Lock" (Anti-Alt+Tab)

Once the interview begins, the Electron app takes over the fullscreen display. If the user successfully Alt+Tabs to a hidden browser, the app violently alerts the recruiter dashboard. Student Logic: Kiosk Mode enforcement.

03

The "Pure Signal" (WebRTC)

The app generates a direct peer-to-peer WebRTC line between the candidate and recruiter. Zero lag. Smart Feature for Portfolios: Add an AI Sound detection library. If the app detects "whispering" from a hidden second person in the room, it flags the recording.

The Technical Architecture

To execute this, students need to step out of "Web Browsers" and interact directly with the OS.

1. Web-to-App Magic (Deep Linking)

To launch this app via a web portal link securely (e.g. myportal://join/12345), you register a Custom Protocol in Electron utilizing app.setAsDefaultProtocolClient('myportal'). This proves you understand local OS bridge integrations.

2. The "Nuclear Option" (Killing Tasks): The very moment the "JOIN" button is clicked, your app must aggressively cleanse the PC of unauthorized software to protect the recruiter's integrity.

const { exec } = require('child_process');

// Force close highly utilized cheating vectors on Windows OS via the command line layer
exec('taskkill /F /IM chrome.exe');
exec('taskkill /F /IM discord.exe');
exec('taskkill /F /IM anydesk.exe');

Why This Secures High-Paying Offers

When a student opens their laptop and demonstrates this desktop application to an interviewer, they aren't just showing standard web code. They are explicitly proving:

This architectural blueprint is provided for educational engineering purposes.