{"id":44161,"date":"2026-05-12T16:13:48","date_gmt":"2026-05-12T20:13:48","guid":{"rendered":"https:\/\/www.lightspeedsystems.com\/?p=44161"},"modified":"2026-05-12T17:00:01","modified_gmt":"2026-05-12T21:00:01","slug":"k-12-proxy-bypass-has-changed-heres-what-were-doing-about-it","status":"publish","type":"post","link":"https:\/\/www.lightspeedsystems.com\/pt\/blog\/k-12-proxy-bypass-has-changed-heres-what-were-doing-about-it\/","title":{"rendered":"A forma de burlar o sistema de proxy no ensino fundamental e m\u00e9dio mudou. Veja o que estamos fazendo a respeito."},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"44161\" class=\"elementor elementor-44161\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a4ab67c e-con e-atomic-element e-flexbox-base e-a4ab67c-58c4e7f\" data-id=\"a4ab67c\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"a4ab67c\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0924fe3 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"0924fe3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<h2 \n\t\tdata-interaction-id=\"e19e4a8\" \n\t\tclass=\"e-e19e4a8-d49fd56 e-heading-base\" \n\t\t \n\t\tdata-e-type=\"widget\" data-id=\"e19e4a8\"\n\t>\n\t\n\t\t\t3 Principais Conclus\u00f5es:\n\t\t<\/h2>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d712d4 elementor-widget elementor-widget-text-editor\" data-id=\"8d712d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>Proxy bypass has evolved far beyond VPNs.<\/strong> Students are now using AI-built camouflage sites that pass content categorization and then swap their content, open-source proxy frameworks available on GitHub, and game aggregators that require no proxy at all. Traditional detection approaches only catch part of this picture \u2014 closing the gap requires seeing the page the way the student actually sees it.<\/li><li><strong>Visibility is the prerequisite for everything else.<\/strong> When a bypass succeeds, IT admins lose the insight that makes the rest of their security posture function. Lightspeed Filter\u2122&#8217;s new Real-Time Bypass Detection can run in silent reporting mode for 14 days, giving districts a clear picture of what&#8217;s actually happening across their network before a single automatic block is triggered.<\/li><li><strong>AI platform activity is a blind spot most districts haven&#8217;t addressed yet.<\/strong> Staff and students are using ChatGPT, Gemini, and Copilot with sensitive data in ways that create real compliance and safety exposure \u2014 and no AI vendor provides an audit trail. Lightspeed Systems&#8217; new AI Prompt Capture feature, now in Early Access, logs prompt sessions directly to the existing web activity report, giving districts the visibility they need without requiring a new platform or workflow.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-636468d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"636468d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26ad8e3 elementor-widget elementor-widget-spacer\" data-id=\"26ad8e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<p class=\"e-paragraph-base\" data-interaction-id=\"bd0a996\"  data-e-type=\"widget\" data-id=\"bd0a996\">\n\t\t\t\t\t\t\t\tI've been thinking about bypass as a pressure valve problem. You seal off one avenue \u2014 shared domains, VPNs, known proxy lists \u2014 and the pressure doesn't disappear. It finds the next weak point in the pipe. When we launched our shared domains category a few years ago, it made a real dent. Then the landscape shifted again<strong>. It always does.<\/strong><br><br> What's different now is the speed and sophistication. Students are using open-source frameworks like Ultraviolet and Scramjet \u2014 both available as top GitHub results, downloadable by anyone in a few clicks. They're using AI to build convincing education sites complete with plausible lesson content, get them correctly categorized, and then quietly swap the content afterward. Some of those sites even have hidden keyboard shortcuts that unlock full access once they've passed review. And then there are game aggregators: standalone Google Sites or custom domains that skip proxies entirely and just host hundreds of games directly. Traditional proxy detection doesn't catch those at all. <br><br>We talk a lot about the threat statistics \u2014 1 in 3 students has attempted to bypass content filtering, ransomware payouts targeting K-12 have climbed past $1.5 million \u2014 but I think the more useful frame is operational. When a bypass succeeds, you stop knowing what's going on. You're not just dealing with distraction risk. You lose the visibility that makes everything else work. \n\t\t\t\t\t<\/p>\n\t\t\t\t<div class=\"elementor-element elementor-element-a118066 elementor-widget elementor-widget-spacer\" data-id=\"a118066\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8afe328 elementor-widget__width-initial elementor-widget elementor-widget-video\" data-id=\"8afe328\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/fz6aQp809KA&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41b9e50 elementor-widget elementor-widget-spacer\" data-id=\"41b9e50\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0eed05f e-con e-atomic-element e-flexbox-base\" data-id=\"0eed05f\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"0eed05f\">\n\t\t\t\t\t\t\t<h2 \n\t\tdata-interaction-id=\"36e7c7a\" \n\t\tclass=\"e-heading-base\" \n\t\t \n\t\tdata-e-type=\"widget\" data-id=\"36e7c7a\"\n\t>\n\t\n\t\t\tThree blind spots we kept running into\n\t\t<\/h2>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2fd9c7e e-con e-atomic-element e-flexbox-base\" data-id=\"2fd9c7e\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"2fd9c7e\">\n\t\t\t\t\t\t\t\t<p class=\"e-paragraph-base\" data-interaction-id=\"aeebf0f\"  data-e-type=\"widget\" data-id=\"aeebf0f\">\n\t\t\t\t\t\t\t\tAs we've dug into this problem over the past year, three gaps kept surfacing in how most districts are set up.&nbsp;<br><br><strong>The first is on-device content.<\/strong> Network-level filtering sees domains and URLs, but it can't see what a page is actually rendering when a student is in the browser. A site that passed categorization last week can change its content today. The only way to catch that is to see the page the way the student sees it \u2014 from inside the browser, in real time.&nbsp;<br><br><strong>The second is off-network coverage.<\/strong> Devices leave campus. They connect to home networks, coffee shop Wi-Fi, wherever. Threats accumulate in that unprotected window and then walk back through your door the next morning. Filtering that changes behavior based on network creates predictable gaps that are easy to exploit \u2014 intentionally or not.&nbsp;<br><br><strong>The third is AI platform activity.<\/strong> Staff are moving fast and not always stopping to think about data policies before pasting student information into ChatGPT, Gemini, or Copilot. Students are using these tools in ways that create real safety and compliance exposure. And none of those platforms provide an audit trail. Until now, there hasn't been a way to know what's happening or investigate after the fact.&nbsp;\n\t\t\t\t\t<\/p>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2bf243f e-con e-atomic-element e-flexbox-base\" data-id=\"2bf243f\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"2bf243f\">\n\t\t\t\t\t\t\t<h2 \n\t\tdata-interaction-id=\"2f28510\" \n\t\tclass=\"e-heading-base\" \n\t\t \n\t\tdata-e-type=\"widget\" data-id=\"2f28510\"\n\t>\n\t\n\t\t\tWhat we built to close them \n\t\t<\/h2>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bea3890 e-con e-atomic-element e-flexbox-base\" data-id=\"bea3890\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"bea3890\">\n\t\t\t\t\t\t\t\t<p class=\"e-paragraph-base\" data-interaction-id=\"9877966\"  data-e-type=\"widget\" data-id=\"9877966\">\n\t\t\t\t\t\t\t\t<a target=\"_blank\" href=\"https:\/\/www.lightspeedsystems.com\/pt\/filter-bypass-prevention\/\"><strong>Real-Time Bypass Detection<\/strong><\/a> is our answer to the first blind spot. We just launched it into Early Access for Chrome, Windows, and Mac, and I'm genuinely proud of how it works. It runs as a lightweight helper extension alongside your existing <a target=\"_blank\" href=\"https:\/\/www.lightspeedsystems.com\/pt\/products\/lightspeed-filter\/\">Filtro Lightspeed\u2122<\/a> setup and scans pages the way the student actually experiences them \u2014 not just the URL, but the JavaScript variables, the DOM structure, the presence of proxy library fingerprints, the behavioral patterns of game aggregators like tiled layouts and HTML5 canvas asset pulls. It re-scans as the page changes, so it's not a fire-and-forget check. And it runs in silent reporting mode by default, so you can see exactly what it's finding before you turn on automatic blocking.&nbsp;<br><br>We were serious about performance from the start. This runs on 2019-era Chromebooks without any perceptible impact. The detection logic is essentially a very sophisticated, layered set of programmatic rules \u2014 not a heavy AI model \u2014 so we can tune it tightly and optimize it for low-end hardware.&nbsp;<br><br><a target=\"_blank\" href=\"https:\/\/www.lightspeedsystems.com\/pt\/blog\/how-k-12-districts-can-monitor-student-ai-use-without-blocking-it\/\"><strong>Captura de prompts de IA<\/strong><\/a> is our answer to the third blind spot. It launched into Early Access the same week as Real-Time Bypass Detection. The same helper extension that powers bypass detection also scans ChatGPT, Gemini, and Copilot \u2014 the web-based versions \u2014 and logs prompt and response exchanges directly to your web activity report in <a target=\"_blank\" href=\"https:\/\/www.lightspeedsystems.com\/pt\/products\/lightspeed-alert\/\">Alerta de velocidade da luz\u2122<\/a>. You can enable it per policy, so you're not capturing prompts from everyone indiscriminately. It gives you the audit trail the AI vendors won't build themselves.&nbsp;<br><br><a target=\"_blank\" href=\"https:\/\/www.lightspeedsystems.com\/pt\/blog\/lightspeed-systems-launches-next-generation-image-blurring-to-boost-online-safety-in-schools\/\"><strong>Image Blurring,<\/strong><\/a> which we launched into General Availability earlier this year, rounds out the picture. The on-device MobileNet model detects explicit images in real time \u2014 tunable by content category so you can keep it off for education categories where it might create friction \u2014 with zero performance impact.&nbsp;\n\t\t\t\t\t<\/p>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94b03c9 e-con e-atomic-element e-flexbox-base\" data-id=\"94b03c9\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"94b03c9\">\n\t\t\t\t\t\t\t<h2 \n\t\tdata-interaction-id=\"de570e5\" \n\t\tclass=\"e-heading-base\" \n\t\t \n\t\tdata-e-type=\"widget\" data-id=\"de570e5\"\n\t>\n\t\n\t\t\tHow we recommend getting started \n\t\t<\/h2>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-370a380 e-con e-atomic-element e-flexbox-base\" data-id=\"370a380\" data-element_type=\"e-flexbox\" data-e-type=\"e-flexbox\" data-interaction-id=\"370a380\">\n\t\t\t\t\t\t\t\t<p class=\"e-paragraph-base\" data-interaction-id=\"8c37a52\"  data-e-type=\"widget\" data-id=\"8c37a52\">\n\t\t\t\t\t\t\t\tAll three features use the same helper extension, which makes deployment straightforward. For Image Blurring, you can install it today from your software setup page in the Lightspeed console. <br><br>For Real-Time Bypass Detection and AI Prompt Capture, reach out to your Account Manager or Solutions Engineer to get added to Early Access. Once you're in, the toggle appears in your policy settings. Not sure who your contact is? Log into help.lightspeedsystems.com \u2014 your assigned team is listed there. <br><br>My strong recommendation: start with 14 days of silent detection. No blocking, just reporting. Look at what the system is actually catching across your network. It will tell you more about your real exposure than any threat briefing could, and it gives you the data to make an informed decision about where and how to configure automatic blocking. <br><br>The bypass landscape isn't going to stop evolving. But for the first time, we're not just chasing it from one step behind \u2014 <strong>we're seeing what students actually see. <\/strong>\n\t\t\t\t\t<\/p>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-62e1e31 e-flex e-con-boxed e-con e-parent\" data-id=\"62e1e31\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3bd6d43 elementor-widget elementor-widget-heading\" data-id=\"3bd6d43\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Perguntas frequentes<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca59269 elementor-widget__width-initial custom-accordion elementor-widget elementor-widget-n-accordion\" data-id=\"ca59269\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Acorde\u00e3o. Abra links com Enter ou Espa\u00e7o, feche com Escape e navegue com as Teclas de Seta\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2120\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-2120\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> How does Real-Time Bypass Detection actually work \u2014 what is it detecting? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2120\" class=\"elementor-element elementor-element-49bf569 e-con-full e-flex e-con e-child\" data-id=\"49bf569\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b21f6fc elementor-widget elementor-widget-text-editor\" data-id=\"b21f6fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Real-Time Bypass Detection uses a browser extension that runs alongside the Lightspeed Filter\u2122 agent on the student&#8217;s device. It scans the page as the student actually sees it \u2014 not just the URL \u2014 looking at JavaScript variables, DOM structure, the presence of known proxy library fingerprints (like those used by Ultraviolet or Scramjet), and behavioral patterns such as about:blank window launchers and HTML5 canvas tiling consistent with game aggregators. It re-scans as the page changes, so it isn&#8217;t a one-time check at page load. You can run it in silent reporting mode to collect data before enabling automatic blocking.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2121\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2121\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Does this affect device performance, especially on older Chromebooks? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2121\" class=\"elementor-element elementor-element-44c719b e-con-full e-flex e-con e-child\" data-id=\"44c719b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5c16ef5 elementor-widget elementor-widget-text-editor\" data-id=\"5c16ef5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>N\u00e3o.<\/strong> The team tested Real-Time Bypass Detection against 2019-era Chromebooks specifically to make sure older, lower-powered devices don&#8217;t take a performance hit. The detection engine is built as programmatic logic \u2014 a layered system of rules that scans for specific indicators \u2014 not a heavy on-device AI model. That architecture lets the team tune and optimize it to run with no perceptible impact on the device experience for students.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2122\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2122\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Can I try this without automatically blocking anything first?  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2122\" class=\"elementor-element elementor-element-9da84af e-con-full e-flex e-con e-child\" data-id=\"9da84af\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6668243 elementor-widget elementor-widget-text-editor\" data-id=\"6668243\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Yes,<\/strong> and that&#8217;s actually what we recommend. Real-Time Bypass Detection has a silent reporting mode where all detections appear in your web activity log without triggering any blocks. We suggest running it this way for 14 days to understand what&#8217;s happening across your network before deciding where and how to configure automatic blocking. You can also configure blocking at the category level, so you&#8217;re not forced into an all-or-nothing choice.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2123\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2123\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What platforms does Real-Time Bypass Detection support? What about iOS?  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2123\" class=\"elementor-element elementor-element-e655929 e-con-full e-flex e-con e-child\" data-id=\"e655929\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-35ac645 elementor-widget elementor-widget-text-editor\" data-id=\"35ac645\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Real-Time Bypass Detection is currently in Early Access<\/strong> for Chrome, Windows, and Mac. iOS is a known gap \u2014 Apple&#8217;s platform restrictions make this technically challenging. The team is actively exploring options, including MDM-managed Safari extensions in newer iOS versions, which have become more viable recently. In the meantime, iOS users still benefit from the detection data feeding into content recategorization by the Lightspeed content team, which has moved significant content into the Security Proxy category since Early Access launched.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2124\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2124\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What is AI Prompt Capture, and which platforms does it cover? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2124\" class=\"elementor-element elementor-element-c86b1e9 e-con-full e-flex e-con e-child\" data-id=\"c86b1e9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f0d9461 elementor-widget elementor-widget-text-editor\" data-id=\"f0d9461\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AI Prompt Capture is a new Early Access feature that logs student and staff prompt and response sessions from supported AI platforms directly into your Lightspeed web activity report. It uses the same browser extension as Real-Time Bypass Detection and Image Blurring, so there&#8217;s no additional installation required. At launch, it covers the web-based versions of ChatGPT, Gemini, and Copilot. Additional platforms will be added over time. It&#8217;s configurable per policy, so administrators can choose which student populations to enable it for.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2125\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"6\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2125\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> How do I get access to these Early Access features? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2125\" class=\"elementor-element elementor-element-bf1e9f3 e-con-full e-flex e-con e-child\" data-id=\"bf1e9f3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-60b708e elementor-widget elementor-widget-text-editor\" data-id=\"60b708e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Reach out to your Lightspeed Systems Account Manager or Solutions Engineer to get added to the Early Access program. Once added, the Real-Time Bypass Detection and AI Prompt Capture toggles will appear in your policy settings. If you&#8217;re not sure who your Account Manager is, log into help.lightspeedsystems.com \u2014 your assigned contacts are listed there. The helper extension required for all three features (bypass detection, image blurring, AI prompt capture) is available to all customers today from the software setup page and can be deployed in minutes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2126\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"7\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2126\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Game aggregators are mentioned as a separate bypass vector \u2014 how does Lightspeed detect those? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2126\" class=\"elementor-element elementor-element-fa3c443 e-con-full e-flex e-con e-child\" data-id=\"fa3c443\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c123ced elementor-widget elementor-widget-text-editor\" data-id=\"c123ced\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Game aggregators are sites \u2014 often hosted on Google Sites or similar platforms \u2014 that don&#8217;t use a proxy at all. They simply host a large collection of games directly, which means traditional proxy detection misses them entirely. Real-Time Bypass Detection addresses this by looking at behavioral patterns beyond proxy library fingerprints: tile-based page layouts, how the page loads and initiates HTML5 canvases, asset sourcing patterns, and other indicators consistent with game aggregator frameworks like Nebula or Interstellar. Game aggregator detection is enabled by default when you turn on Real-Time Bypass Detection, though it can be adjusted if needed.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5fa7180 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"5fa7180\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;animation&quot;:&quot;slideInUp&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-62c81a9 e-con-full e-flex e-con e-child\" data-id=\"62c81a9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5d4b64d elementor-widget elementor-widget-spacer\" data-id=\"5d4b64d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-539052a elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"539052a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Do you know what's getting through your filter right now?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-370a795 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"370a795\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Start a 14-day silent detection trial and get a full picture of bypass activity across your district \u2014 <strong>no disruption, no configuration required, and no obligation.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-badc433 elementor-widget elementor-widget-button\" data-id=\"badc433\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/www.lightspeedsystems.com\/pt\/resources\/14-day-side-by-side-bypass-audit\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Obtenha sua auditoria de bypass.<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52f7695 elementor-widget elementor-widget-spacer\" data-id=\"52f7695\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>The bypass landscape isn&#8217;t going to stop evolving. But for the first time, we&#8217;re not just chasing it from one step behind \u2014 we&#8217;re seeing what students actually see. <\/p>","protected":false},"author":19,"featured_media":44162,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"K-12 proxy bypass","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"1 in 3 students attempts to bypass filters. See how Lightspeed's real-time detection closes the blind spots traditional filtering misses.","footnotes":""},"categories":[1],"tags":[],"class_list":["post-44161","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":{"authors":[777]},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>K-12 Proxy Bypass Has Changed. Here&#039;s What We&#039;re Doing About It. - Lightspeed Systems<\/title>\n<meta name=\"description\" content=\"1 in 3 students attempts to bypass filters. See how Lightspeed&#039;s real-time detection closes the blind spots traditional filtering misses.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lightspeedsystems.com\/pt\/blog\/k-12-proxy-bypass-has-changed-heres-what-were-doing-about-it\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"K-12 Proxy Bypass Has Changed. Here&#039;s What We&#039;re Doing About It.\" \/>\n<meta property=\"og:description\" content=\"1 in 3 students attempts to bypass filters. See how Lightspeed&#039;s real-time detection closes the blind spots traditional filtering misses.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lightspeedsystems.com\/pt\/blog\/k-12-proxy-bypass-has-changed-heres-what-were-doing-about-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Lightspeed Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/lightspeedsystems\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-12T20:13:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-12T21:00:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2026\/05\/Filter-Webinar-Promo-01.png\" \/>\n\t<meta property=\"og:image:width\" content=\"650\" \/>\n\t<meta property=\"og:image:height\" content=\"378\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"gracemellette\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lightspeedsys\" \/>\n<meta name=\"twitter:site\" content=\"@lightspeedsys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matthew Burg\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/blog\\\/k-12-proxy-bypass-has-changed-heres-what-were-doing-about-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/blog\\\/k-12-proxy-bypass-has-changed-heres-what-were-doing-about-it\\\/\"},\"author\":{\"name\":\"gracemellette\",\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/#\\\/schema\\\/person\\\/a996dc5e11a575f0b42c0e12340978aa\"},\"headline\":\"K-12 Proxy Bypass Has Changed. Here&#8217;s What We&#8217;re Doing About It.\",\"datePublished\":\"2026-05-12T20:13:48+00:00\",\"dateModified\":\"2026-05-12T21:00:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/blog\\\/k-12-proxy-bypass-has-changed-heres-what-were-doing-about-it\\\/\"},\"wordCount\":2446,\"publisher\":{\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/blog\\\/k-12-proxy-bypass-has-changed-heres-what-were-doing-about-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/Filter-Webinar-Promo-01.png\",\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/blog\\\/k-12-proxy-bypass-has-changed-heres-what-were-doing-about-it\\\/\",\"url\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/blog\\\/k-12-proxy-bypass-has-changed-heres-what-were-doing-about-it\\\/\",\"name\":\"K-12 Proxy Bypass Has Changed. Here's What We're Doing About It. - Lightspeed Systems\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/blog\\\/k-12-proxy-bypass-has-changed-heres-what-were-doing-about-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/blog\\\/k-12-proxy-bypass-has-changed-heres-what-were-doing-about-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/Filter-Webinar-Promo-01.png\",\"datePublished\":\"2026-05-12T20:13:48+00:00\",\"dateModified\":\"2026-05-12T21:00:01+00:00\",\"description\":\"1 in 3 students attempts to bypass filters. See how Lightspeed's real-time detection closes the blind spots traditional filtering misses.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/blog\\\/k-12-proxy-bypass-has-changed-heres-what-were-doing-about-it\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.lightspeedsystems.com\\\/blog\\\/k-12-proxy-bypass-has-changed-heres-what-were-doing-about-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/blog\\\/k-12-proxy-bypass-has-changed-heres-what-were-doing-about-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/Filter-Webinar-Promo-01.png\",\"contentUrl\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/Filter-Webinar-Promo-01.png\",\"width\":650,\"height\":378},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/blog\\\/k-12-proxy-bypass-has-changed-heres-what-were-doing-about-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"K-12 Proxy Bypass Has Changed. Here&#8217;s What We&#8217;re Doing About It.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/\",\"name\":\"Lightspeed Systems\",\"description\":\"Helping K-12 communities provide safe, secure, and equitable education\u2014effortlessly.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/#organization\",\"name\":\"Lightspeed Systems\",\"url\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/lightspeed_systems_logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/lightspeed_systems_logo.svg\",\"caption\":\"Lightspeed Systems\"},\"image\":{\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/lightspeedsystems\\\/\",\"https:\\\/\\\/x.com\\\/lightspeedsys\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/lightspeed-systems\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/#\\\/schema\\\/person\\\/a996dc5e11a575f0b42c0e12340978aa\",\"name\":\"gracemellette\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/618018ae54f6cabf8dcfeba46b0734c9b0a3e36b133a10a6130d917ad395cbd9?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/618018ae54f6cabf8dcfeba46b0734c9b0a3e36b133a10a6130d917ad395cbd9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/618018ae54f6cabf8dcfeba46b0734c9b0a3e36b133a10a6130d917ad395cbd9?s=96&d=mm&r=g\",\"caption\":\"gracemellette\"},\"url\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/pt\\\/person\\\/matthew-burg\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"K-12 Proxy Bypass Has Changed. Here's What We're Doing About It. - Lightspeed Systems","description":"1 in 3 students attempts to bypass filters. See how Lightspeed's real-time detection closes the blind spots traditional filtering misses.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lightspeedsystems.com\/pt\/blog\/k-12-proxy-bypass-has-changed-heres-what-were-doing-about-it\/","og_locale":"pt_BR","og_type":"article","og_title":"K-12 Proxy Bypass Has Changed. Here's What We're Doing About It.","og_description":"1 in 3 students attempts to bypass filters. See how Lightspeed's real-time detection closes the blind spots traditional filtering misses.","og_url":"https:\/\/www.lightspeedsystems.com\/pt\/blog\/k-12-proxy-bypass-has-changed-heres-what-were-doing-about-it\/","og_site_name":"Lightspeed Systems","article_publisher":"https:\/\/www.facebook.com\/lightspeedsystems\/","article_published_time":"2026-05-12T20:13:48+00:00","article_modified_time":"2026-05-12T21:00:01+00:00","og_image":[{"width":650,"height":378,"url":"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2026\/05\/Filter-Webinar-Promo-01.png","type":"image\/png"}],"author":"gracemellette","twitter_card":"summary_large_image","twitter_creator":"@lightspeedsys","twitter_site":"@lightspeedsys","twitter_misc":{"Written by":"Matthew Burg","Est. reading time":"7 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.lightspeedsystems.com\/blog\/k-12-proxy-bypass-has-changed-heres-what-were-doing-about-it\/#article","isPartOf":{"@id":"https:\/\/www.lightspeedsystems.com\/blog\/k-12-proxy-bypass-has-changed-heres-what-were-doing-about-it\/"},"author":{"name":"gracemellette","@id":"https:\/\/www.lightspeedsystems.com\/zh\/#\/schema\/person\/a996dc5e11a575f0b42c0e12340978aa"},"headline":"K-12 Proxy Bypass Has Changed. Here&#8217;s What We&#8217;re Doing About It.","datePublished":"2026-05-12T20:13:48+00:00","dateModified":"2026-05-12T21:00:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.lightspeedsystems.com\/blog\/k-12-proxy-bypass-has-changed-heres-what-were-doing-about-it\/"},"wordCount":2446,"publisher":{"@id":"https:\/\/www.lightspeedsystems.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.lightspeedsystems.com\/blog\/k-12-proxy-bypass-has-changed-heres-what-were-doing-about-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2026\/05\/Filter-Webinar-Promo-01.png","articleSection":["Uncategorized"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.lightspeedsystems.com\/blog\/k-12-proxy-bypass-has-changed-heres-what-were-doing-about-it\/","url":"https:\/\/www.lightspeedsystems.com\/blog\/k-12-proxy-bypass-has-changed-heres-what-were-doing-about-it\/","name":"K-12 Proxy Bypass Has Changed. Here's What We're Doing About It. - Lightspeed Systems","isPartOf":{"@id":"https:\/\/www.lightspeedsystems.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.lightspeedsystems.com\/blog\/k-12-proxy-bypass-has-changed-heres-what-were-doing-about-it\/#primaryimage"},"image":{"@id":"https:\/\/www.lightspeedsystems.com\/blog\/k-12-proxy-bypass-has-changed-heres-what-were-doing-about-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2026\/05\/Filter-Webinar-Promo-01.png","datePublished":"2026-05-12T20:13:48+00:00","dateModified":"2026-05-12T21:00:01+00:00","description":"1 in 3 students attempts to bypass filters. See how Lightspeed's real-time detection closes the blind spots traditional filtering misses.","breadcrumb":{"@id":"https:\/\/www.lightspeedsystems.com\/blog\/k-12-proxy-bypass-has-changed-heres-what-were-doing-about-it\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lightspeedsystems.com\/blog\/k-12-proxy-bypass-has-changed-heres-what-were-doing-about-it\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.lightspeedsystems.com\/blog\/k-12-proxy-bypass-has-changed-heres-what-were-doing-about-it\/#primaryimage","url":"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2026\/05\/Filter-Webinar-Promo-01.png","contentUrl":"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2026\/05\/Filter-Webinar-Promo-01.png","width":650,"height":378},{"@type":"BreadcrumbList","@id":"https:\/\/www.lightspeedsystems.com\/blog\/k-12-proxy-bypass-has-changed-heres-what-were-doing-about-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.lightspeedsystems.com\/"},{"@type":"ListItem","position":2,"name":"K-12 Proxy Bypass Has Changed. Here&#8217;s What We&#8217;re Doing About It."}]},{"@type":"WebSite","@id":"https:\/\/www.lightspeedsystems.com\/zh\/#website","url":"https:\/\/www.lightspeedsystems.com\/zh\/","name":"Sistemas Lightspeed","description":"Ajudando comunidades do ensino fundamental e m\u00e9dio a oferecer educa\u00e7\u00e3o segura, protegida e equitativa, sem esfor\u00e7o.","publisher":{"@id":"https:\/\/www.lightspeedsystems.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lightspeedsystems.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.lightspeedsystems.com\/zh\/#organization","name":"Sistemas Lightspeed","url":"https:\/\/www.lightspeedsystems.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.lightspeedsystems.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2024\/12\/lightspeed_systems_logo.svg","contentUrl":"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2024\/12\/lightspeed_systems_logo.svg","caption":"Lightspeed Systems"},"image":{"@id":"https:\/\/www.lightspeedsystems.com\/zh\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/lightspeedsystems\/","https:\/\/x.com\/lightspeedsys","https:\/\/www.linkedin.com\/company\/lightspeed-systems\/"]},{"@type":"Person","@id":"https:\/\/www.lightspeedsystems.com\/zh\/#\/schema\/person\/a996dc5e11a575f0b42c0e12340978aa","name":"Gracemellette","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/618018ae54f6cabf8dcfeba46b0734c9b0a3e36b133a10a6130d917ad395cbd9?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/618018ae54f6cabf8dcfeba46b0734c9b0a3e36b133a10a6130d917ad395cbd9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/618018ae54f6cabf8dcfeba46b0734c9b0a3e36b133a10a6130d917ad395cbd9?s=96&d=mm&r=g","caption":"gracemellette"},"url":"https:\/\/www.lightspeedsystems.com\/pt\/person\/matthew-burg\/"}]}},"_links":{"self":[{"href":"https:\/\/www.lightspeedsystems.com\/pt\/wp-json\/wp\/v2\/posts\/44161","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lightspeedsystems.com\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lightspeedsystems.com\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lightspeedsystems.com\/pt\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lightspeedsystems.com\/pt\/wp-json\/wp\/v2\/comments?post=44161"}],"version-history":[{"count":10,"href":"https:\/\/www.lightspeedsystems.com\/pt\/wp-json\/wp\/v2\/posts\/44161\/revisions"}],"predecessor-version":[{"id":44189,"href":"https:\/\/www.lightspeedsystems.com\/pt\/wp-json\/wp\/v2\/posts\/44161\/revisions\/44189"}],"acf:post":[{"embeddable":true,"href":"https:\/\/www.lightspeedsystems.com\/pt\/wp-json\/wp\/v2\/person\/777"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lightspeedsystems.com\/pt\/wp-json\/wp\/v2\/media\/44162"}],"wp:attachment":[{"href":"https:\/\/www.lightspeedsystems.com\/pt\/wp-json\/wp\/v2\/media?parent=44161"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lightspeedsystems.com\/pt\/wp-json\/wp\/v2\/categories?post=44161"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lightspeedsystems.com\/pt\/wp-json\/wp\/v2\/tags?post=44161"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}