Introduction
Introduction Statistics Contact Development Disclaimer Help
Post ApDu8d8MsVwglRCvoG by [email protected]
More posts by [email protected]
Post #ApDo2IcncPY5h42W5w by [email protected]
0 likes, 1 repeats
@jschauma just off hand:- exfiltration of company IP would be harder to catch- …
Post #ApDrUq7Azs4LX1Y5aK by [email protected]
0 likes, 0 repeats
@paul_ipv6 @jschauma Could you clarify that second thing? You can't serious…
Post #ApDrUqKID6YqBhgZ1s by [email protected]
0 likes, 1 repeats
@nasado @jschauma tor is your choice of who you connect to and trust. but your …
Post #ApDu8cx1Ygs6CFts80 by [email protected]
0 likes, 0 repeats
@paul_ipv6 detection of exfiltration would require deep packet inspection; if y…
Post #ApDu8d8MsVwglRCvoG by [email protected]
0 likes, 0 repeats
@jschauma you can't use tor without client initiation but if the client dev…
Post #ApDu8dGsMskdBpBj4S by [email protected]
0 likes, 0 repeats
@paul_ipv6 Not allowing devices you don't control is fair. But I'm aski…
Post #ApDu8dQ5oc7jePV5RA by [email protected]
0 likes, 1 repeats
@jschauma depends on what they're doing. if what they are doing isn't c…
Post #ApDv7dzIJpTp4n3bNY by [email protected]
0 likes, 0 repeats
@paul_ipv6 Right. But presumably you already have a policy saying something lik…
Post #ApDv7eAHeyGpcsCNVY by [email protected]
0 likes, 1 repeats
@jschauma sure. tor is no worse than any form of encrypted traffic, even HTTPS.…
Post #ApE1k8hDC4YR2tL2B6 by [email protected]
0 likes, 1 repeats
@jschauma These days I side-eye any enterprise with any normal user devices on …
You are viewing proxied material from pleroma.anduin.net. The copyright of proxied material belongs to its original authors. Any comments or complaints in relation to proxied material should be directed to the original authors of the content concerned. Please see the disclaimer for more details.