Blog
Insights
e Shadow Display: Why HDMI Splitters and VGA Bypasses are the #1 Threat to Assessment Integrity
In the current global assessment landscape, the battle for academic and professional honesty has moved from the software environment to the physical hardware layer. While institutions have historically focused on eye-tracking algorithms and browser-based lockdowns, a massive technical loophole remains wide open: the signal output. Our internal research and forensic audits of high-stakes testing programs confirm that hardware HDMI splitters and VGA bypasses have become the most popular cheating methods in 2026, dominating both physical testing centers and remote assessments.
Orken Rakhmatulla
Head of Education

In the current global assessment landscape, the battle for academic and professional honesty has shifted from the software environment to the physical hardware layer. While institutions have historically focused on eye-tracking algorithms and browser-based lockdowns, a massive technical loophole remains wide open: the signal output. Through our work with a diverse range of global clients, we have confirmed that hardware HDMI splitters and VGA bypasses have become the most popular cheating methods in 2026, dominating both physical testing centers and high-stakes remote assessments.
Organized fraud groups have recognized that hardware-level interventions happen outside the view of the operating system's software state. Consequently, they market these methods as the "ultimate solution" for bypassing digital invigilation.
The Infrastructure Crisis: Pre-Wired Testing Centers
One of the most significant challenges we have faced with our clients is the vulnerability of physical testing centers. Because professional fraud groups often gain clandestine access to the testing infrastructure, they are able to "pre-wire" stations with hardware-based bypasses. In these environments, cheaters do not rely on software exploits; they utilize the very hardware provided by the center to leak content.
By the time a candidate sits down to begin their session, the workstation is already compromised. An HDMI splitter or a VGA bypass is hidden deep within the cable management or behind the desk paneling. This allows a remote "helper" to see the live questions in real-time while the center's standard monitoring tools return an "All Clear" status. This is currently the primary method used by organized fraud syndicates to ensure passing scores for their high-paying clients.
The Anatomy of a Hardware Bypass
To understand why this is the top threat to integrity, one must understand the difference between the Application Layer (where most proctoring software resides) and the Hardware Layer (where the actual fraud occurs).
The Master/Slave Hardware Configuration
The most common execution of this fraud utilizes an active, powered HDMI splitter. In this "Master/Slave" setup, the candidate connects their testing computer directly to the splitter's input. The splitter then duplicates the unencrypted video signal into two identical paths:
Primary Output: This connects to the legitimate monitor on the desk. The student sees the exam normally, and to any observer, the setup looks standard.
Shadow Output: This output carries a bit-for-bit duplicate of the exam screen. This signal is sent to a second monitor, a capture card, or a high-definition recording device.
Because this duplication occurs physically after the signal has left the Graphics Processing Unit (GPU), the computer’s Operating System (OS) is entirely unaware of the split. Standard proctoring tools use User-Mode (Ring 3) Display APIs to check for multiple monitors. The splitter is designed to lie to these APIs, reporting only a single authorized display while the content is simultaneously leaked to a remote helper.
The Test Center Blind Spot: Hiding the Hardware
A common misconception is that physical testing centers are safer than remote environments. In reality, the hardware loophole is even more prevalent in offline centers due to the ease of hiding a physical trail.
Forensic investigations in testing centers have revealed sophisticated setups where VGA male-to-female extenders and HDMI-to-VGA adapters are used to run shadow cables through walls, under floorboards, or behind furniture. VGA is frequently chosen by cheaters because its analog nature and lack of modern encryption make it easier to "strip" content protection and send the signal over long-distance extenders to an accomplice in an adjoining room without triggering the technical sync errors that might occur with long HDMI runs.
EDID Spoofing: The Digital Cloak
Advanced splitters utilize EDID Spoofing to ensure they remain invisible to even the most rigorous software audits. Every monitor has Extended Display Identification Data (EDID)—a digital fingerprint that tells the computer its manufacturer, model, and serial number.
A sophisticated cheating device clones the EDID of the student's primary monitor and transmits that data to the PC. When the proctoring software queries the system for hardware configurations, the computer believes it is talking directly to a single, legitimate display. This spoofing bypasses 100% of proctoring solutions that rely solely on software-level display inquiries.
Closing the Loophole with ContentProtect™
To counter these "invisible" threats, TrustExam.ai developed ContentProtect™. This is the industry’s only solution for true Intrusion Blocking. While many online assessments were previously vulnerable to these shadow displays, we have successfully blocked these methods with ContentProtect.
ContentProtect™ moves beyond the browser and into the System Driver Layer (Kernel Mode / Ring 0). By operating at the deepest level of the operating system, our technology identifies the subtle physical and electrical artifacts that splitters inevitably create:
In an era where technology has made cheating easy, TrustExam.ai makes it impossible. If you are proctoring the "window" while cheaters are bypassing the "system," you are not actually protecting your credentials.
Orken Rakhmatulla
Head of Education
Share

