randysmith: (Default)
[personal profile] randysmith
So I recently discovered that my company reserves the right to monitor electronic communications (because they blocked some sites that were both against the company code of conduct and were being accessed). This puts me in a dilemma. I don't particularly care for my own sake if they know what I read from work--I'm happy to take whatever negative consequences come from that. But sometimes I read things that are private to other people, and I don't know what level of care to take there. My email I access through https from a computer I own and control, so I think that's basically safe. But my friends list is viewed over an open HTTP connection.

I'll note that my best guess is that this isn't a problem. I can't imagine my company using any information personal to me or my friends; I both think basically well of them (for a large company) and I don't see the motivation. Why should they go to the trouble of making trouble for someone they don't know when it won't gain them anything? But I'm not sure I should be making that decision for other people.

So I turn to my friends list. How do you deal with the issue of your employer monitoring web accesses? Do you avoid reading your friends list from work? Do you do some funky nerd thing to keep them from being able to see it? Or do you do something else? This inquiring mind wants to know :-}.

(Obviously, if this bothers you on a personal level, let me know, and I'll stop reading your journal from work. Note that this'll mean I'm more likely to miss stuff in your journal, and certainly won't respond as quickly to it).

(no subject)

Date: 2006-02-11 12:02 am (UTC)
From: [identity profile] lyonesse.livejournal.com
hi, i saw this on friendsfriends, and as a developer of a bunch of sniffer software i feel i must comment :)

the safest way to do this is to ssh out to a host you own, and run your lj client there. then the traffic is encrypted on the wire, and even its origin at livejournal is obscured. if you want a graphical interface you can use x tunnelling over ssh.

happy privacy :)

(no subject)

Date: 2006-02-11 01:35 am (UTC)
From: [identity profile] dajt.livejournal.com
If you set your ssh server to only accept keyed authentication, keep your private key on a usb-fob, and give the key a good passphrase, well, it'll be much easier for the black hats to use a nine-millimeter attack on you. There are automated ssh-attack programs in the hands of the kiddies, but afaik, they can only attack servers that both left password authentication enabled and have weak paswords. I see them try to attack my machines from time to time, but I think they're about as pathetic as the folks who keep trying to access .dll files on my OpenBSD-based web server.

I don't worry much about my company's IT department monitoring my web traffic. There just aren't enough of them, and I'm probably one of the most boring employees. Xuxa tells some amusing stories about some of the folks she's had to deal with in her sysadmining career. I figure I'm safe as long as I'm way way less interesting than them.

(no subject)

Date: 2006-02-11 06:13 am (UTC)
ext_106590: (Default)
From: [identity profile] frobzwiththingz.livejournal.com
So, you appear to be one of those few folk who are OK with having a box connected to the internet, yet are too paranoid to have *any* services accessible to the outside running on it, even just an SSH port.

I won't try to talk you out of this position, but will instead say that you might want to google for "port-knocking", read up a bit, and see if you'd be
willing to accept that. [And if you wouldn't accept some sort of scheme based on that, i'd ask how long you spent on your line-by-line code audit of whatever DNS package your server is using.]

(no subject)

Date: 2006-02-11 02:16 am (UTC)
From: [identity profile] ruthling.livejournal.com
Eh, in for a penny, in for a pound, I say! If someone wanted to make trouble for me, it's out there already, and if they want to make trouble for you through me, I'd say huh!

(no subject)

Date: 2006-02-11 03:32 am (UTC)
From: [identity profile] catya.livejournal.com
you could use an ssh tunnel - my theory was that if someone went back to look at the urls i had looked at, they wouldn't see my friends locked posts anyway (i've worked at places that explicitly tracked urls, but not anything past that that i know of)

(no subject)

Date: 2006-02-11 05:05 am (UTC)
coraline: (Default)
From: [personal profile] coraline
i know that they monitor our net access at work, though they thankfully don't block anything -- they treat us like adults. i assume that my traffic gets lost in the noise, and i also assume that anything i post, even locked, could get read by the general public anytime, so while there are things there i'd rather not tell the world, i won't fall over and die if the world knows, either.

(no subject)

Date: 2006-02-11 01:41 pm (UTC)
From: [identity profile] kuruzansuz.livejournal.com
when I used the internet at work ... when I was in that kind of environment ... I would clear history and cache and all that when I was done. This way, if anyone went to the computer after me, they wouldn't have a record of where I'd been. However, if they track another way, they may still know. Also ... if they go to live journal ... if they are not logged in under your account, they will not see your friend's locked posts. Right?

(no subject)

Date: 2006-02-11 03:10 pm (UTC)
From: [identity profile] kuruzansuz.livejournal.com
I understand that. I have no idea what my journal is going to become so I don't have qualms if you read it from work or not.

(no subject)

Date: 2006-02-11 03:36 pm (UTC)
From: [identity profile] wolfkitn.livejournal.com
i'm relatively new with my org, and i've been cautiously and occasionally reading LJ from work. my basic take has been, there are *7000* employees, here. i'm not exactly reading anything dangerous. if they really, really want to monitor people...

on the other hand, i like my job, and i have no idea how many of those 7000 employees are actually computer or internet users; so perhaps i both have more to lose and stand out more than i'd like. so i try to keep it infrequent, low-key, and i don't open up "NWS" links...

(no subject)

Date: 2006-02-11 09:26 pm (UTC)
From: (Anonymous)
I use an ssh tunnel to a machine that someone I trust owns and controls, which seems to me to be appropriately cautious without being overly paranoid :)

My take?

Date: 2006-06-18 12:17 pm (UTC)
From: [identity profile] morriganmoon.livejournal.com
If the content you are reading is posted on a web-based service, it's technically public information, and people shouldn't fear others reading it...

AND-- well, the IT people would only look for things that would endanger the company some how... so livejournal probably wouldn't be their main concern... :-p

I mean, I do it. I POST while at work... :-p but, until it's Technical Journal season, I'm left with little else to do... :-p

Profile

randysmith: (Default)
randysmith

April 2017

S M T W T F S
      1
234 5678
9101112131415
16171819202122
23242526272829
30      

Style Credit

Expand Cut Tags

No cut tags