Why YSK: It appears several Lemmy Instances are flagged as suspicious and at least 1 instance intentionally using the name of ransomware. A couple of the big enterprise monitoring suites (Fortiguard, ZScaler) will flag your account and may end up with you being pulled into an office for an explanation, or worse.

TL;DR: Keep browsing to your local instance at work for now.

  • @echo64
    link
    401 year ago

    This is what you should be doing on all corporate networks. What personal sites you go to is none of their business.

    Alternatively, don’t use their network and use your cell connection, but for some people, that’s not gonna work, I know.

      • @applejacks
        link
        131 year ago

        Work Wi-Fi is not your connection.

    • @Borkingheck
      link
      -101 year ago

      It is the business’s business to be aware of what sites its employers are using.

          • @[email protected]
            link
            fedilink
            11 year ago

            Lol I work for a Fortune 100 company, they did not need me to afford this shitty work PC, but sure. This is our PC, comrade. Seize the means etc

              • @[email protected]
                link
                fedilink
                11 year ago

                That doesn’t make the PC, network, and connection belong to the employees. You’re making ideological leaps that are not in tune with the reality of the situation. Obviously the company can’t exist without employees. That doesn’t matter in this situation. Fact, a company run by capitalists. Fact, I am paid a wage. Fact, my wage is what I agreed to take as payment for my labor. Fact, this PC I use to perform my duties IS NOT FUCKING MINE.

                Christ.

      • @echo64
        link
        61 year ago

        Nah, they sure do want to know, though. It’s not businesses business to know what book you are reading on lunch break, it’s not businesses business to know what newspaper you are reading at work, it’s not businesses business to know what social media sites you are reading.

        • @[email protected]
          link
          fedilink
          11 year ago

          I am of the perspective that if you are accessing that book or newspaper or social media sites using company equipment and network resources, then the company, as the network operator, sets the terms and conditions of you using their network. That can extend to SSL decryption of all connections or blocking unwanted programs or websites or nothing at all, it is all down to the company policies at that point since they own the equipment and pay for the ISP connection.

          I don’t think it’s a good idea to use company networking equipment or connections with the same expectation of privacy (or control) as an internet connection you pay for. (eg. Home ISP, wireless carrier, etc) Even consumer ISP connections have certain well-known protocols blocked at the carrier as part of the terms and conditions of utilizing the ISP’s connections. It may be your traffic, but it may not be your network it is traversing. Most network operators have an inherent interest in the traffic traversing their networks.

          • @echo64
            link
            11 year ago

            You’re perspective is a very authoritarian hellhole of a perspective I’ve gotta say. If you think just because the company controls the network connection they get full obliterating rights to your every waking moment and you get zero levels of privacy then we are on very different sides of worker rights.

              • @echo64
                link
                11 year ago

                No, I understood you, I didn’t misconstrue anything. We just differ massively in opinion. You think the network operator gets to decide the content that flows over the network. I say the network operator pushes packets and has no right to interfere in your private life.

                The move to further and less breakable forms of encryption between clients heavily suggests that the tide is turning in my direction.