Vector 1: Screen Capture APIs
This is the most common detection vector, and the one most tools fail completely.
When you share your screen on Zoom, Google Meet, or Microsoft Teams, the application calls the operating system's screen capture API. On Windows, this is the Windows Graphics Capture API (or the older BitBlt/DirectX capture paths). These APIs enumerate all visible windows and composite them into the capture output. Any visible window — including browser tabs, overlays, tooltips, and floating widgets — gets captured.
Most AI interview copilots render their overlay in a browser window, a browser extension popup, or an Electron window without capture exclusion. All of these are visible to the screen capture API. The interviewer sees everything you see.
How faFAANG solves this: faFAANG calls SetWindowDisplayAffinity(hwnd, WDA_EXCLUDEFROMCAPTURE) on every window it creates — control, pane, and pane_history. This is a Win32 API call that instructs the Windows Display Infrastructure to exclude these windows from all capture output at the compositor level. The windows are rendered to the local display but omitted from every capture path — screen recording, screen sharing, screenshot tools, OBS, everything.
This is not a CSS opacity trick. Not a z-index manipulation. Not a transparency hack. It's an OS-level instruction to the display compositor that no screen capture tool can override, because the exclusion happens before the capture pipeline ever sees the pixel data.
Vector 2: Taskbar and Process Footprint
Even if a tool manages to hide its overlay from screen capture, it often leaves traces elsewhere. A taskbar button. A system tray icon. A visible window title in Alt+Tab. A window with standard chrome (title bar, close button, border). Any of these can be spotted by an interviewer who asks you to “show me your whole desktop” or “can you Alt+Tab so I can see what you have open?”
Many tools leave at least one of these footprints. Browser-based tools always show a tab in the browser's tab bar. Desktop tools often show a taskbar button or a system tray icon.
How faFAANG solves this: Every BrowserWindow in faFAANG — control, pane, and pane_history — is created with skipTaskbar: true, frame: false, and transparent: true. No taskbar entry exists. No tray icon exists. No window chrome is rendered. There is no title bar, no border, no visible decoration. The windows are completely invisible to the OS task management UI.
Vector 3: Browser Extension and Tab Detection
Browser-based AI interview tools face a detection surface that's impossible to eliminate: the browser itself. Interview platforms actively scan for three things:
Extension manifest scanning — Browser extensions have a manifest.json that declares permissions, content scripts, and background workers. Proctoring tools and interview platforms can query the browser's extension APIs to detect known extensions. Some platforms maintain blocklists of known AI copilot extension IDs.
Active tab switching — When a user switches from the coding environment tab to another tab, the platform detects the focus loss. Repeated tab switches during a live interview are a strong detection signal. CoderPad, HireVue, and similar platforms log these events.
Platform-level browser restrictions — Some interview platforms use browser APIs to restrict extension behavior during monitored sessions, similar to how testing platforms disable extensions in kiosk mode.
How faFAANG solves this: faFAANG is not a browser extension. It has no browser tab. It is a native Electron desktop application. There is no manifest.json to scan. No tab to detect. No browser focus to switch. The browser has no knowledge that faFAANG exists, because faFAANG operates entirely outside the browser process tree.
Vector 4: Focus and Click Stealing
Some overlay tools require you to click on them to interact. When you click an overlay window, that window gains OS focus, and the previous window (your coding environment) loses it. This produces two detectable artifacts:
First, the cursor jump. Your mouse visibly moves from the code editor to a different region of the screen, then jumps back. On a screen share, this movement is visible to the interviewer. It's anomalous — why did you click on empty space next to your editor?
Second, the focus loss. The coding environment briefly loses keyboard focus. If you're typing code and the focus switches, you'll see a cursor blink change or a brief input interruption. Platform-level proctoring can log these focus events.
How faFAANG solves this: In Coding Mode, faFAANG's pane window runs in click-through mode by default. The window is set to non-focusable, passing all mouse and keyboard input directly to the underlying application. You cannot accidentally click the overlay. You cannot tab into it. The cursor never leaves your coding environment. The overlay is visible to you on the local display but interactionally invisible — as if it doesn't exist as a clickable surface.
When you need to interact with the overlay (e.g., to scroll through a long response in Experience Mode), you toggle interactivity with Ctrl+W — a global hotkey that fires without changing focus.
Vector 5: Network Traffic Fingerprinting
Cloud-dependent AI interview tools make identifiable API calls to their own servers during the interview. If the interview platform or the employer's network team monitors outbound traffic, these calls are distinguishable from normal browsing. A burst of API calls to api.finalroundai.com or api.lockedinai.com during an interview is a clear signal.
Corporate networks increasingly use DNS-level monitoring and TLS inspection that can categorize outbound connections by domain. If the tool's API domain is known to be an interview cheating tool, the connection is flagged before the first packet is decoded.
How faFAANG solves this: faFAANG's response path goes through your own ChatGPT/Codex account. The user logs into their own account, and the CodexAppServerClient routes requests through that authenticated session. There is no faFAANG-owned API endpoint in the response path. The outbound traffic is to chat.openai.com — indistinguishable from the millions of engineers who use ChatGPT daily. No unique domain. No fingerprinting surface.
The Complete Detection Matrix
| Detection Vector | Most Tools | faFAANG |
|---|---|---|
| Screen capture | Visible — no capture exclusion | WDA_EXCLUDEFROMCAPTURE on all windows |
| Taskbar footprint | Taskbar button or browser tab visible | skipTaskbar: true, frameless, transparent |
| Browser/extension detection | Extension manifest scannable, tab detectable | Not a browser tool — nothing to scan |
| Focus stealing | Click required — cursor jump visible | Click-through mode, 21 global hotkeys |
| Network fingerprinting | API calls to tool's own servers | Traffic goes to user's own ChatGPT |
Invisibility isn't a setting. It's an architecture. faFAANG is the only tool in this category built on the right one.