Why YSK: It appears several Lemmy Instances are flagged as suspicious and at least 1 instance intentionally using the name of ransomware. A couple of the big enterprise monitoring suites (Fortiguard, ZScaler) will flag your account and may end up with you being pulled into an office for an explanation, or worse.

TL;DR: Keep browsing to your local instance at work for now.

      • rjs001@lemmygrad.ml
        link
        fedilink
        arrow-up
        1
        arrow-down
        6
        ·
        1 year ago

        No, even on company equipment is isn’t. That equipment was paid for by the employees so it’s their right to use it

        • littlecolt@lemm.ee
          link
          fedilink
          arrow-up
          2
          arrow-down
          1
          ·
          1 year ago

          Lol I work for a Fortune 100 company, they did not need me to afford this shitty work PC, but sure. This is our PC, comrade. Seize the means etc

            • littlecolt@lemm.ee
              link
              fedilink
              arrow-up
              2
              arrow-down
              1
              ·
              1 year ago

              That doesn’t make the PC, network, and connection belong to the employees. You’re making ideological leaps that are not in tune with the reality of the situation. Obviously the company can’t exist without employees. That doesn’t matter in this situation. Fact, a company run by capitalists. Fact, I am paid a wage. Fact, my wage is what I agreed to take as payment for my labor. Fact, this PC I use to perform my duties IS NOT FUCKING MINE.

              Christ.

    • echo64@lemmy.world
      link
      fedilink
      arrow-up
      6
      ·
      1 year ago

      Nah, they sure do want to know, though. It’s not businesses business to know what book you are reading on lunch break, it’s not businesses business to know what newspaper you are reading at work, it’s not businesses business to know what social media sites you are reading.

      • Nerve_Lonely@lemmy.one
        link
        fedilink
        arrow-up
        1
        ·
        1 year ago

        I am of the perspective that if you are accessing that book or newspaper or social media sites using company equipment and network resources, then the company, as the network operator, sets the terms and conditions of you using their network. That can extend to SSL decryption of all connections or blocking unwanted programs or websites or nothing at all, it is all down to the company policies at that point since they own the equipment and pay for the ISP connection.

        I don’t think it’s a good idea to use company networking equipment or connections with the same expectation of privacy (or control) as an internet connection you pay for. (eg. Home ISP, wireless carrier, etc) Even consumer ISP connections have certain well-known protocols blocked at the carrier as part of the terms and conditions of utilizing the ISP’s connections. It may be your traffic, but it may not be your network it is traversing. Most network operators have an inherent interest in the traffic traversing their networks.

        • echo64@lemmy.world
          link
          fedilink
          arrow-up
          1
          ·
          1 year ago

          You’re perspective is a very authoritarian hellhole of a perspective I’ve gotta say. If you think just because the company controls the network connection they get full obliterating rights to your every waking moment and you get zero levels of privacy then we are on very different sides of worker rights.

            • echo64@lemmy.world
              link
              fedilink
              arrow-up
              1
              ·
              1 year ago

              No, I understood you, I didn’t misconstrue anything. We just differ massively in opinion. You think the network operator gets to decide the content that flows over the network. I say the network operator pushes packets and has no right to interfere in your private life.

              The move to further and less breakable forms of encryption between clients heavily suggests that the tide is turning in my direction.