Q&A: Can You Use Company Devices Privately?

Поделиться
HTML-код
  • Опубликовано: 15 июл 2024
  • Q&A174: How can you achieve privacy on company devices? How do we handle high-privilege risks like Intel ME and AMD PSP? What are our thoughts on the new Fairbuds? Are there any privacy-friendly speech synthesis software for Windows? Join our next Q&A on Patreon: / q-can-you-use-103001806
    Welcome to the Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest security & privacy news.
    ❤️ Support us on Patreon: / surveillancepod
    💛 Support us on Liberapay: liberapay.com/surveillancereport
    🪙 Monero: 46iGe5D49rpgH4dde32rmyWifMjw5sHy7V2mD9sXGDJgSWmAwQvuAuoD9KcLFKYFsLGLpzXQs1eABRShm1RZRnSy6HgbhQD
    Sources: sr.url.lol/sources
    00:00 Introduction
    00:27 PSA
    00:58 Privacy & Company-Issued Devices
    05:06 ME, PSP, & Other High-Privilege Risks
    10:12 Our Thoughts on the Fairbuds
    11:54 Privacy-Friendly Speech Synthesis Software for Windows
    Main Sites
    Surveillance Report: www.surveillancereport.tech/
    Odysee: odysee.com/@surveillancereport:2
    PeerTube: apertatube.net/c/surveillance...
    Techlore Website: techlore.tech
    The New Oil Website: thenewoil.org/
    #privacy #security #news
  • НаукаНаука

Комментарии • 11

  • @JohnSmith-gd2ws
    @JohnSmith-gd2ws 2 месяца назад +6

    Thank you for putting Q&A in the title!
    *and in the thumbnail too 🎉

  • @TiagoTiagoT
    @TiagoTiagoT 2 месяца назад +3

    An important note is to not use company hardware for personal use; and do your best to limit it's access to your home network and other devices. Might also be a good idea to get a faraday bag to leave it in while not in use (but don't leave it charging or powered on in there, obvious fire hazard).

  • @FactFinderGeneral
    @FactFinderGeneral 2 месяца назад +1

    Modifying company devices can sometimes even break the law if it jepordizes things like patient data. If a breach happens stock then it's on the company. If it happens on a modded device it can be you who is held liable.

  • @ashishpj
    @ashishpj 2 месяца назад

    I liked his threat modal: "I don't wanna be the guy who puts ransomware on company device" They have your social security no. real name, and more.

  • @skywz
    @skywz 2 месяца назад

    On Linux, I use ~~Voice~~ Speech Note, but not very often so I don't really know how good it is.

  • @RockPDX
    @RockPDX 2 месяца назад

    Fantastic info, thanks. On the subject of privacy, something i've been curious about but haven't see any discussion on- lots of people use alternative OS's on their phone- i.e. graphene or other open source AOSP OS's- i've wondered, can people in some situations be shooting themselves in the foot? For example, you're a target of some murder investigation- if the phone is blocking ability to track everything that you're doing, well, that can keep you tagged as a suspect, even when you might've been dozens of miles away.. Any thoughts?

    • @FactFinderGeneral
      @FactFinderGeneral 2 месяца назад +1

      Absolutely. To install some custom roms you have to keep the bootloader unlocked. An unlocked bootloader is a point of vulnerability, particularly in places with corruption law enforcement or places where warrants aren't needed for devices. It can also make device finger printing easier. Privacy alone isn't enough to justify making someone a suspect though in most Western countries. In some Eastern countries using encryption can be a crime itself.

  • @EasyMac308
    @EasyMac308 2 месяца назад

    Hey, why do you guys have comments disabled over on Odysee?

  • @mikemaldanado6015
    @mikemaldanado6015 2 месяца назад

    Strong passwords won't thwart malware attacks on company networks. If you are on a company network you are as safe as the weakest link. Once the weakest link is breached and a hacker gets admin rights your system will be compromised. Most malware companies are done through email anyway so again, strong passwords don't help.

  • @Iswimandrun
    @Iswimandrun 2 месяца назад

    So simply run virtual box and run another os as a virtual machine.

    • @EasyMac308
      @EasyMac308 2 месяца назад +1

      Doesn't help if corporate IT scrapes your screen, records keystrokes, or examines your virtual disks.