Why YSK: It appears several Lemmy Instances are flagged as suspicious and at least 1 instance intentionally using the name of ransomware. A couple of the big enterprise monitoring suites (Fortiguard, ZScaler) will flag your account and may end up with you being pulled into an office for an explanation, or worse.
TL;DR: Keep browsing to your local instance at work for now.
It is the business’s business to be aware of what sites its employers are using.
Only on company equipment.
Removed by mod
Lol I work for a Fortune 100 company, they did not need me to afford this shitty work PC, but sure. This is our PC, comrade. Seize the means etc
Removed by mod
That doesn’t make the PC, network, and connection belong to the employees. You’re making ideological leaps that are not in tune with the reality of the situation. Obviously the company can’t exist without employees. That doesn’t matter in this situation. Fact, a company run by capitalists. Fact, I am paid a wage. Fact, my wage is what I agreed to take as payment for my labor. Fact, this PC I use to perform my duties IS NOT FUCKING MINE.
Christ.
Removed by mod
You’re 100% wrong in this instance, you can’t just make your baseless assertion again. Begone troll.
Removed by mod
Nah, they sure do want to know, though. It’s not businesses business to know what book you are reading on lunch break, it’s not businesses business to know what newspaper you are reading at work, it’s not businesses business to know what social media sites you are reading.
I am of the perspective that if you are accessing that book or newspaper or social media sites using company equipment and network resources, then the company, as the network operator, sets the terms and conditions of you using their network. That can extend to SSL decryption of all connections or blocking unwanted programs or websites or nothing at all, it is all down to the company policies at that point since they own the equipment and pay for the ISP connection.
I don’t think it’s a good idea to use company networking equipment or connections with the same expectation of privacy (or control) as an internet connection you pay for. (eg. Home ISP, wireless carrier, etc) Even consumer ISP connections have certain well-known protocols blocked at the carrier as part of the terms and conditions of utilizing the ISP’s connections. It may be your traffic, but it may not be your network it is traversing. Most network operators have an inherent interest in the traffic traversing their networks.
You’re perspective is a very authoritarian hellhole of a perspective I’ve gotta say. If you think just because the company controls the network connection they get full obliterating rights to your every waking moment and you get zero levels of privacy then we are on very different sides of worker rights.
That completely misconstrue’s my statements. Have a nice day.
No, I understood you, I didn’t misconstrue anything. We just differ massively in opinion. You think the network operator gets to decide the content that flows over the network. I say the network operator pushes packets and has no right to interfere in your private life.
The move to further and less breakable forms of encryption between clients heavily suggests that the tide is turning in my direction.