Why YSK: It appears several Lemmy Instances are flagged as suspicious and at least 1 instance intentionally using the name of ransomware. A couple of the big enterprise monitoring suites (Fortiguard, ZScaler) will flag your account and may end up with you being pulled into an office for an explanation, or worse.

TL;DR: Keep browsing to your local instance at work for now.

  • @Ajen
    link
    4011 months ago

    And the same goes for company wifi if you have to log in with your own username.

    • @[email protected]
      link
      fedilink
      English
      2111 months ago

      Even if you don’t, there’s plenty of different ways to identify a user on company wifi.

      For example, have your cellphone named “Stephano’s iPhone”? Narrows it down to the Stephanos working in range of that access point.

    • @[email protected]
      link
      fedilink
      511 months ago

      I usually used a VPN if I was on the WiFi. Made me feel better even if I’m just browsing memes

      • @Ajen
        link
        511 months ago

        Connecting to an “unauthorized” VPN is against IT policy for some companies, especially if your job involves handling sensitive data.

        • @gravitas_deficiency
          link
          111 months ago

          Handling sensitive or classified data is absolutely a valid justification for categorically banning the use of unauthorized VPNs. Doing so effectively eliminates a huge data exfiltration vector, which can be a major concern in those contexts. It’s not about being a dick to the workforce - it’s about making sure you’re prepared for that one fucking asshole who thinks he’s special and can get away with it.

    • @[email protected]
      link
      fedilink
      English
      111 months ago

      Always use a VPN when on a network you can’t trust. There are plenty of free and trustworthy ones you can activate with one click, and then all the company sees is noise.

      • @Ajen
        link
        English
        1111 months ago

        I trust my company’s wifi network a lot more than a free VPN app.

        • @[email protected]
          link
          fedilink
          English
          311 months ago

          Different threat models. There’s the threat of being punished or fired by workplace surveillance;

          Separately, there’s also the threat of some unknown third-party snooping on your data for whatever other reason (identify fraud, etc).

          The post discusses the first and I’d argue that’s more compelling for most people, but the second is also valid.

          • @Ajen
            link
            English
            111 months ago

            deleted by creator

        • @[email protected]
          link
          fedilink
          2
          edit-2
          11 months ago

          RiseupVPN, calynx and protonvpn are pretty great and trustworthy. 2 first ones are non profit based on donations only. And proton VPN is well audited (but require account while the first two doesn’t)

        • ferret
          link
          English
          011 months ago

          Cloudflare’s free VPN is trustworthy and very fast. You don’t get to pick server location though so it is only useful for cases like this.

      • @[email protected]
        link
        fedilink
        411 months ago

        If the company owns the endpoint there’s lots they can do to monitor your traffic even with a VPN. For phones if you sign in to work mail with your phone and allow them to manage your device just assume they have control of it now.

          • Saik0
            link
            fedilink
            English
            111 months ago

            Work computers are by definition not personal devices.

            • @Ajen
              link
              English
              011 months ago

              And refusing to install your company’s software on your work computer is a good way to get fired for cause.

              But some people have the option to access work email, etc on their personal devices, as long as they install their company’s monitoring/security software.