18 Tips for Recruiters to Identify Fake & Dishonest Candidates in Remote Job Interviews
Remote interviews make hiring faster and more flexible — but they also open doors to impersonation, proxy interviews, deepfakes, and other dishonest behaviors. The good news: many of these risks are detectable if you know what to look for and follow disciplined verification steps. Below are 18 practical tips you can start using today, plus sample scripts and follow-up checks.
The 18 Tips
Review the candidate’s digital footprint beforehand
Check LinkedIn, GitHub, personal websites, and public portfolios for consistency. Look for patterns in writing, timing of contributions, and public project history that match what the candidate claims.
Remote interviews make hiring faster and more flexible — but they also open doors to impersonation, proxy interviews, deepfakes, and other dishonest behaviors. The good news: many of these risks are detectable if you know what to look for and follow disciplined verification steps. Below are 18 practical tips you can start using today, plus sample scripts and follow-up checks.
Verify identity documents before the interview (if policy allows)
Require a scanned government ID or corporate email verification ahead of time when appropriate, and confirm that names, roles, and locations line up with public profiles.
Ask for a short pre-interview task delivered live
Send a 10–15 minute micro-task (coding, problem-solving, or a short written prompt) to be completed at the start of the interview. Time pressure reduces the chance of outside help.
Require the candidate to join from a device with video + mic
Prefer candidates who use a single device for video and audio. Multiple devices or screen-sharing from odd setups can be a sign of proxying or external assistance.
Ask them to share their entire screen at the start
If your platform supports it, require full-screen sharing (not just app window). Tell them why: transparency builds trust and captures overlays that normal app windows can hide.
Check network indicators after they share the screen
Look at their network speed, latency, and connection metadata (if visible). High round-trip times, proxies, or sudden IP/region changes during session can be suspicious.
Scan for VPN/proxy use and inconsistent IP locations
If your tool shows IP location, verify it against the candidate’s stated location. Repeated or abrupt location hops during an interview are red flags.
Observe video and audio quality for anomalies
Watch for mismatched lip-sync, odd lighting on the face vs background, or compressed/artificial audio. These are typical of deepfake or voice-modulation attempts.
Use live verification gestures
Ask the candidate to perform a quick physical verification: raise their right hand, tilt their head, or hold up an ID next to their face. Watch for lag or inconsistent overlays.
Ask unexpected, process-based follow-ups
After a candidate answers, follow up with “How did you arrive at that?” or “Can you show me the steps?” Honest candidates can explain their process; someone fed answers often cannot.
Ask them to explain code or diagrams line-by-line
For technical roles, have candidates walk through their code or architecture reasoning. Request live edits or refinements. Proxy solvers will struggle to justify choices.
Listen for unnatural conversational pacing
Instant, perfectly formed answers or responses that arrive with exact timing may indicate an assistant reading outputs. Natural candidates pause, think aloud, and revise answers.
Require intermittent environment checks
At random points, ask the candidate to pan the camera, show the room corners, or confirm who else is present. Repeating checks makes proxying harder.
Use proctoring tools (e.g., Hyproctor) as evidence-gathering, not automatic judges
Tools can flag virtual cams, remote-control software, IP anomalies, and hidden overlays — present these as evidence for human review rather than automatic disqualification.
Keep a documented audit trail
Note down timestamps of suspicious events: screen shares started/ended, verification gestures, and any technical anomalies. This helps with internal reviews and escalations.
Train interviewers on red flags and standardized policies
Ensure your team has a consistent, written policy about acceptable use of AI, external help, and what steps to take when cheating is suspected.
Balance security with candidate experience
Be transparent in advance: tell candidates what checks you’ll perform and why. Friction reduces fraud but unnecessary suspicion can harm employer brand.
Follow up with reference and technical checks after the interview
If you’re unsure, do a live pair-programming session, a longer technical interview, or call references to confirm claims about past projects and responsibilities.
Red Flags to Watch For (Quick List)
Perfectly polished answers delivered with no visible thinking time.
Inconsistent public profile vs interview claims (job titles, dates, repos).
Lip-sync issues, mismatched lighting, or audio artifacts.
Candidate refuses to share screen or to perform simple verification gestures.
Sudden changes in network IP or multiple device use not previously indicated.
Candidate won’t explain how they solved a problem or gives vague high-level responses.
Sample Scripts & Prompts
Pre-interview email / instruction:
“Hi [Name], to keep our process fair for everyone, please join from a single device with camera and mic enabled and be prepared to share your full screen for a short environment check at the start of the interview.”
Live verification scripts:
“Can you please pan your camera slowly to show the room for 5 seconds?”
“Please raise your right hand and say your full name.”
“Can you walk me through how you tested that code — what tools did you run, and what output did you observe?”
If you suspect cheating:
“Thanks for your time. Before we proceed, we noticed [X]. Can you clarify what software you were using and why [Y] appeared? We’ll pause and review.”
“We need a company-wide point of view. I’m worried that we’re letting each recruiter or hiring manager or interviewer decide what cheating is — and isn’t.” — John Vlastelica, Founder of Recruiting Toolbox
Post-Interview Verification Steps
Run a short follow-up technical or practical session (pair-programming or whiteboard explanation).
Ask for raw artifacts (repositories with commit history, screen recordings of past work) to verify ownership.
Contact references and ask specific, technical questions about the candidate’s role and deliverables.
If impersonation is strongly suspected, consider escalation to security or legal teams and preserve any evidence collected.
Ethical & Legal Considerations
Always notify candidates about what data will be checked and why. Transparency is both ethical and legally prudent.
Avoid invasive biometric collection unless you have clear legal basis and consent.
Be careful about discrimination risk — verification methods must be applied consistently and fairly.
Closing Thoughts
Detecting dishonesty in remote interviews is a mix of smart tooling, disciplined processes, and good interviewer instincts. No single tip is foolproof — but combining pre-interview checks, live verification, behavioral follow-ups, and post-interview validation dramatically reduces risk. Use tools like Hyproctor to surface evidence, but let trained humans make the final call.