mub

  • 11 Posts
  • 332 Comments
Joined 2 years ago
cake
Cake day: June 6th, 2023

help-circle







  • That was kinda my point. Securing a laptop that will have access to data you want to protect from loss is a near bottomless pit of issues. There comes a point you have to do a risk assessment and apply a level of security that meets your legal requirements and contractual obligations. I’m sure this is all doable on Linux as well but the low cost / easily available tools are mostly for Windows.

    I suspect that taking the “secured remote session” approach is probably good enough for their needs. It just needs a client app you can trust to respect the security rules they want to enforce (no screen shots, no screen recording, no data transfers for any sort, etc).

    OCRing what is on screen is not really stoppable unless you force them to keep their camera on so you can monitor them 24/7. But if you try hard enough there is usually a way around most security measures.

    Either way, they need to decide what the risk impact vs likelihood profile is, and what the business can tolerate. They’ll need to discuss it with legal and data protection folks to assess that.

    One tip is to embed records and values that look meaningful, but are unique, into the copy of the data given to the specific employee. This can be used to potentially prove that a data breach was a result of something that employee did. We like to put QUID’s as invisible watermarks in document headers. These trigger our DLP systems which is always funny cos its usually an employee who is leaving and wants to keep something. I love those conversions.



  • mubtoAsklemmy*Permanently Deleted*
    link
    fedilink
    arrow-up
    2
    ·
    24 days ago

    Yes, it is still excellent even by today’s standards, and you can see why so many new shows followed their big budget approach.

    There are a couple small parts that can be a bit hard to get through, but for me that’s just part of the situation they are in, and it is all totally worth it.

    No matter what anyone thinks of the ending, it does at least have a conclusion. You are not left wondering or half expecting a sequel.


  • This is the only reliable solution. To expand:

    1. Provide a Laptop with Windows on it, because that is easier to lockdown.
    2. apply desirable OS lock downs like blocking usb ports prevent storage devices, don’t give the user admin rights, etc.
    3. Setup a VPN server (openvpn should do) and configure the laptop with a VPN client. Configure the client so it blocks network connections that don’t go via the VPN. If you want to give them internet access you’ll need a proxy and firewall and DLP solution. At this point it all gets very complex and expensive.

    The real answer is you are probably screwed without investing a bunch of time, effort, and cost.

    You might get away with more basic security measures if the user has very limited IT knowledge.

    I suggest getting legal advice before you give the user access to your data in the manner you intend.



  • mubtoAsklemmy*Permanently Deleted*
    link
    fedilink
    arrow-up
    10
    ·
    24 days ago

    To be consistent on a physical level.

    I play guitar and games like rocket league, things that require excellent physical dexterity, and consistency is a big factor. I struggle to repeat physical actions the same way every time. I practice lots, and I’m reasonably good at both things (imho), but I know I screw up more than most people because I can’t repeat things the same way every time.








  • mubtoAsklemmyIs there any hope for me?
    link
    fedilink
    arrow-up
    5
    ·
    1 month ago

    I’m looking for evidence that this post is real. It is too perfect, like the stuff chatgpt produces. But I’m old and very cynical.

    One alternative is her low IQ diagnosis was off. I suggest seeing someone to have that rechecked. If it turned out to be closer to the average 100 it could make her feel more positive about her own potential.