104
submitted 2 days ago by cm0002@libretechni.ca to c/privacy@lemmy.ca
you are viewing a single comment's thread
view the rest of the comments
[-] stoy@lemmy.zip 6 points 2 days ago

There is nothing to prevent MS from sending the keys from every intune instance.

[-] wizardbeard@lemmy.dbzer0.com 4 points 2 days ago

You don't have to store them in intune, as far as I know. I'm not a desktop engineer, but I know at my workplace they historically are stored in AD.

[-] SpikesOtherDog@ani.social 3 points 2 days ago

Here it depends. Is AD in Azure? This privacy statement seems to indicate that Microsoft has full access to your data and that it's just company policy that keeps them out.

If your servers are on site and firewalled, then Microsoft would need some sort of remote access tool that tracks each server. This means that on-site licensing and patching needs to be done. I can't think of any other service off the top of my head, but I'm only a desktop engineer.

[-] phil@lymme.dynv6.net 1 points 2 days ago

No such issue with end-to-end encryption, as only the end user devices have the keys. It's used by Apple (that was the main argument in the FBI wanting to unlock iPhones), some messaging services like Signal and Whatsapp, only mentioning big tech. Of course, you have to trust them when it's closed source. Here the story is that Microslop chose from the beginning centralized keys that they own and can share. It' s all well known, but the news is that they really did it.

this post was submitted on 24 Jan 2026
104 points (99.1% liked)

privacy

7890 readers
44 users here now

Big tech and governments are monitoring and recording your eating activities. c/Privacy provides tips and tricks to protect your privacy against global surveillance.

Partners:

founded 3 years ago
MODERATORS