• 0 Posts
  • 31 Comments
Joined 2 years ago
cake
Cake day: June 20th, 2023

help-circle

  • I guess it depends on the company and their policies. I’ve been an admin in Google Workspace, and it’s almost hard to avoid seeing some of the reports of the metadata of external incoming and outgoing email.

    I remember we even had a rule for external emails with a name that employee name. This was mostly to identify and block scammers impersonating the CEO, but would also inadvertently catch a whole bunch of other weird stuff people were doing as well, but that was mostly someone setting up a shadow IT service that would send email with the name of an employee, which we’d then have to chase and figure out.

    I’m less familiar with the MDM software running on laptops, it’s possible that each file copied to a thumb drive is logged, so that is totally a risk, but i imagine it would be harder to detect if that’s a common thing that people do at the org.


  • Yeah, that could depend on the level of monitoring and access they have, and what your risk level is. Since they say it’s a small company, the laptops might not be managed, but almost certainly they will have reports on incoming and outgoing emails, and a bcc to a gmail address would be a huge red flag. I would assume that small PDF files copied to a thumb drive wouldn’t raise suspicion, but you’d want to fly under the radar and not have the number of files be crazy or the file size be huge, since that would move you to the top of the list in an aggregated report, and have more eyes on you.



  • FYI, your employer will probably see these outgoing emails from your mailbox, it will turn up in logs and be very obvious for someone in IT who you don’t even know if they see emails going to a random gmail address. You probably signed something when you were hired about not doing this, and it might create an IT issue for you. Also, since it’s a bcc, your boss’s replies won’t be there, so it probably won’t do you as much good as you think in proving they told you so. I would not recommend doing this.

    Depending on how much control they can see into your work laptop, i would recommend printing the email threads as PDFs and copying them to a thumb drive if you need them. This would be harder to detect, but if your laptop is managed by the org, and someone does have it out for you, they could be watching your every movement, so it isn’t 100% safe.

    If you think you are being closely monitored, I guess your best course of action would be to get an HDMI capture device on a personal computer, and then record your monitor as you’re viewing the emails.



  • Every one of the posts today that I’ve received have the url https://lemmy.laitinlok.com/pictrs/image/e1be7d9e-9e3e-4ba9-9c08-1ff084b554e1.png. If everyone has the same links, then logging people’s IP would get you the same information as logging IPs from a public post in any popular community. I think that would only make sense if each user was receiving different URLs, for the attacker to log the requested resource and their reference of which user they sent that URL to. I can’t confirm this suspicion on my own, but if the URL I posted is the same one you got today, then I doubt there’s any attempt to match users to their IP addresses.



  • It’s been 14 years since I’ve seen the finale, but I think that the ending with them all together in some afterlife, was both different and enough from the original theories in season one that they were all in purgatory. It was like people who weren’t even watching heard that the ending was they were all dead, and said that they called it in season one.

    That being said, my memory of the final season was pretty lackluster, and the expectation was that everything would be explained and tied together. For the most part, the original questions were answered with even more questions and philosophical metaphors, that just confused people even more leading up to the final season.