this post was submitted on 30 Jun 2024
2271 points (99.4% liked)

Malicious Compliance

19593 readers
1 users here now

People conforming to the letter, but not the spirit, of a request. For now, this includes text posts, images, videos and links. Please ensure that the “malicious compliance” aspect is apparent - if you’re making a text post, be sure to explain this part; if it’s an image/video/link, use the “Body” field to elaborate.

======

======

Also check out the following communities:

!fakehistoryporn@lemmy.world !unethicallifeprotips@lemmy.world

founded 1 year ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] toddestan@lemm.ee 2 points 4 months ago* (last edited 4 months ago) (1 children)

I would also never let corporate IT manage a device, e. g. a laptop connected to my private network at home.

That's pretty standard for working from home. I'm expected to use the company provided, managed laptop with my internet connection.

I figured so long as I made sure of things like there weren't any open file shares and things like routers and IP cameras were password protected there wasn't a whole they could see.

If I was really paranoid I could set up a VLAN or something.

[–] scrion@lemmy.world 2 points 4 months ago

I know it is somewhat of an accepted practice, and a lot of people lack the means or the knowledge to handle it any other way, but I'd still like to raise awareness that you're basically inviting a foreign actor into your network.

The days were people would trust corporations, including their employers, to be generally benevolent and to do the right thing are long over.