Comment Re:Reality of YikYak (Score 4, Informative) 367
YikYak runs off phones or via Chrome if you take the time to run YikYak as a package (or whatever the term is) for Chrome. If the device is connected to the school's wifi, they ought be able to get the log-in associated with that IP address at the time of posting, which YikYak stores and readily provides in the case of police investigations.
The campus I work for has basically taken a much more aggressive position on YikYak and we monitor it...as we remember to. YikYak itself is such a pain in the ass and most of the time it's just students bantering like students (I almost wrote idiots, but given how I was in university, I'm in no position to judge). Most of it is complaints and asking where the next party is.
Funny enough, YikYak's moderation system actually makes it really hard to deal with the threats that do pop-up because they get removed after 5 downvotes, meaning it's hard for us to find them before the students remove the threats. We effectively cannot take action despite wanting to. I wouldn't expect the YikYak folk to spend time contacting schools where the threats are occurring, but I hope that they log it well enough to allow institutions to take action if they feel that any one student is consistently using the service to post threats.