1862
you are viewing a single comment's thread
view the rest of the comments
[-] ricecake@sh.itjust.works 8 points 1 month ago

Eh, it doesn't need to be, you just need to do the work of putting together granular access controls that can account for your risk profiles.

The risk isn't much different between a company owned telephone and a personal telephone.
They're both susceptible to most of the same attacks, or being left on the bus.

this post was submitted on 23 Oct 2024
1862 points (98.6% liked)

Malicious Compliance

20 readers
2 users here now

People conforming to the letter, but not the spirit, of a request. For now, this includes text posts, images, videos and links. Please ensure that the “malicious compliance” aspect is apparent - if you’re making a text post, be sure to explain this part; if it’s an image/video/link, use the “Body” field to elaborate.

======

======

Also check out the following communities:

!fakehistoryporn@lemmy.world !unethicallifeprotips@lemmy.world

founded 1 year ago
MODERATORS