this post was submitted on 16 Aug 2023
0 points (NaN% liked)

Memes

45553 readers
934 users here now

Rules:

  1. Be civil and nice.
  2. Try not to excessively repost, as a rule of thumb, wait at least 2 months to do it if you have to.

founded 5 years ago
MODERATORS
 
top 17 comments
sorted by: hot top controversial new old
[–] DmMacniel@feddit.de 0 points 1 year ago

What is digital sovereignty?

[–] bug@lemmy.one 0 points 1 year ago (1 children)

If they want you to use WhatsApp they can provide you with a device to use it on, then at least it's completely isolated from your own data and can't do too much harm.

[–] kratoz29@lemm.ee 0 points 1 year ago (1 children)

Ok, but this is reality, and in reality schools don't give a fuck about these subjects, third world country schools at least.

[–] crispy_kilt@feddit.de 1 points 1 year ago

They don't give a fuck in first world schools as well

[–] query@lemm.ee 0 points 1 year ago* (last edited 1 year ago) (1 children)

Such a waste of public resources, to not develop (or fund) free and open tools for everyone, instead of paying for temporary licenses for closed software.

[–] Mubelotix@jlai.lu 1 points 1 year ago

Public money public code

[–] testuserpleaseupvote@lemmy.world 0 points 1 year ago (2 children)

Oh, wait until you get a job in most offices. Microsoft, Microsoft everywhere.

BYOD with Linux? "We can't install the company's spyware on it, get that security risk out of here."

[–] Bobert@sh.itjust.works 0 points 1 year ago* (last edited 1 year ago) (2 children)

I mean they're not wrong, BYOD is an absolutely ginormous attack vector.

[–] crispy_kilt@feddit.de 0 points 1 year ago (2 children)

If an organisations' security relies on the end device configuration there is no security.

[–] Bobert@sh.itjust.works 1 points 1 year ago

Who needs defense in depth, right?

[–] Contend6248@feddit.de 0 points 1 year ago (1 children)

You can bring your own devices, but you don't get permission to access anything?

Or what are you even trying to say about what the end users device being able to do anything

[–] crispy_kilt@feddit.de 0 points 1 year ago

I don't think I said anything about what a device can and cannot do

[–] ChickenAndRice@sh.itjust.works 0 points 1 year ago* (last edited 1 year ago) (1 children)

For the user or the company? Assuming the user isn't a moron with computers?

Edit: guess im out of the loop as a contractor who generally only does BYOD with my linux machine

[–] Contend6248@feddit.de 0 points 1 year ago* (last edited 1 year ago)

If a user doesn't understand that having complete control over every device in your network is essential, he's being a complete moron with computers.

You should do your work, not worrying about patching all the 128 tools you think you need, that's other peoples job.

[–] rmuk@feddit.uk 0 points 1 year ago (1 children)

When you're supporting ten thousand machines on four continents and confirming to twenty different data protection doctrines the last thing you need is some neckbeard rocking up demanding to store data in their unauditable homebrew fork of Haiku or some shit.

[–] crispy_kilt@feddit.de 0 points 1 year ago

What is achieved with GPOs and agents is compliance, not security.

In other words, company issued devices don't protect the data, but they ensure conformity with relevant regulations and standards. Which is what most organisations actually care about.

Many good IT people really do care about actual information security, but not those in charge.

The result are devices that hinder some people's work but provide questionable actual security.

[–] Donjuanme@lemmy.world -1 points 1 year ago

What's easier from the teacher/teachers representative, use 1 widely distributed app, or download 100 different messaging programs/interfaces and make sure every student knows the proper channels to contact every other student?

There will always be someone unhappy, let's try to keep that from being the person who has to do this dance day in and out for the rest of their underfunded lives?