Post ApDrUq7Azs4LX1Y5aK by [email protected] | |
More posts by [email protected] | |
Post #ApDo2IcncPY5h42W5w by [email protected] | |
0 likes, 1 repeats | |
@jschauma just off hand:- exfiltration of company IP would be harder to catch- … | |
Post #ApDrUq7Azs4LX1Y5aK by [email protected] | |
0 likes, 0 repeats | |
@paul_ipv6 @jschauma Could you clarify that second thing? You can't serious… | |
Post #ApDrUqKID6YqBhgZ1s by [email protected] | |
0 likes, 1 repeats | |
@nasado @jschauma tor is your choice of who you connect to and trust. but your … | |
Post #ApDu8cx1Ygs6CFts80 by [email protected] | |
0 likes, 0 repeats | |
@paul_ipv6 detection of exfiltration would require deep packet inspection; if y… | |
Post #ApDu8d8MsVwglRCvoG by [email protected] | |
0 likes, 0 repeats | |
@jschauma you can't use tor without client initiation but if the client dev… | |
Post #ApDu8dGsMskdBpBj4S by [email protected] | |
0 likes, 0 repeats | |
@paul_ipv6 Not allowing devices you don't control is fair. But I'm aski… | |
Post #ApDu8dQ5oc7jePV5RA by [email protected] | |
0 likes, 1 repeats | |
@jschauma depends on what they're doing. if what they are doing isn't c… | |
Post #ApDv7dzIJpTp4n3bNY by [email protected] | |
0 likes, 0 repeats | |
@paul_ipv6 Right. But presumably you already have a policy saying something lik… | |
Post #ApDv7eAHeyGpcsCNVY by [email protected] | |
0 likes, 1 repeats | |
@jschauma sure. tor is no worse than any form of encrypted traffic, even HTTPS.… | |
Post #ApE1k8hDC4YR2tL2B6 by [email protected] | |
0 likes, 1 repeats | |
@jschauma These days I side-eye any enterprise with any normal user devices on … |