• Evil_Shrubbery@lemm.ee
    link
    fedilink
    arrow-up
    5
    ·
    edit-2
    1 day ago

    No!
    Absolutely not.

    I want them to be uncomfortable, maybe get a little ptsd.
    I want them to look me in the eye and explain what they didn’t like.

    Yeah, I thought so.

    Remember, always keep your browsing history so fucked up nobody will want to ever even think about what they just read or saw.
    It’s them who wanted to look after all.

  • _____@lemm.ee
    link
    fedilink
    English
    arrow-up
    14
    ·
    1 day ago

    tech tip: don’t ever do anything non work on work devices, use your personal devices instead

  • mosiacmango@lemm.ee
    link
    fedilink
    arrow-up
    8
    ·
    edit-2
    1 day ago

    Most companies run split tunnel VPNs, I.E they only route work traffic over the VPN itself. All other traffic, like traffic straight out of the internet, just goes over your regular connection.

    This limits the bandwidth the VPN has to handle, especially important with people streaming so much.

    This isn’t everywhere though. If you don’t know if they use split tunnel or not, assume they don’t and are logging all your traffic.

    Also, IT folk generally do not give a fuck about what you’re doing if it doesn’t involve malware, but there may be automated systems in play that take it out of their hands.

    • Unforeseen@sh.itjust.works
      link
      fedilink
      arrow-up
      2
      ·
      10 hours ago

      However many VPNs deployed in mid to large work environments are not just a VPN but a whole endpoint client that is filtering web access, etc and logging everything.

      I know most people here would know the difference but I guess unsurprisingly most don’t have a clue as they just call it “the VPN” even though its much more then that.

      • mosiacmango@lemm.ee
        link
        fedilink
        arrow-up
        2
        ·
        9 hours ago

        Yeah things can get messy. Zero trust and EDR bring in complications that wouldn’t be clear to an end user.

        Its best to not do anything “weird” on a work computer, but a lot of times of still won’t be a real issue. It all just depends.

    • limelight79@lemm.ee
      link
      fedilink
      arrow-up
      1
      ·
      1 day ago

      Ohhhh this explains how my router can tell me how much traffic we use for, say, Teams. I’ve wondered about that.

    • EmpathicVagrant@lemmy.world
      link
      fedilink
      arrow-up
      15
      ·
      1 day ago

      If I’m doing work it’s not on my own device. You want me to sign in and monitor me? Cool cool cool when’s my laptop arrive?

  • aeronmelon@lemmy.world
    link
    fedilink
    arrow-up
    9
    ·
    2 days ago

    Riker: forgets

    Data (who admins the ship’s uplink with Starfleet): “I’m gonna pretend I didn’t see that.”

    • wise_pancake@lemmy.ca
      link
      fedilink
      arrow-up
      9
      ·
      1 day ago

      Commander, please refrain from making such crude queries on the ship computer. My most recent security review of the ships logs resulted in a short circuit in my modesty routines and 3 hours 17 minutes and 4 seconds of system downtime.

  • Flying Squid@lemmy.worldM
    link
    fedilink
    arrow-up
    3
    ·
    1 day ago

    I’m guessing any time the Federation equivalent of the FBI gets a ping for whatever Riker is searching for, they just groan and go back to what they were doing.