Rich Freeman via plug on 8 Apr 2021 18:45:05 -0700 |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
Re: [PLUG] that's nice |
On Thu, Apr 8, 2021 at 9:27 PM Fred Stluka via plug <plug@lists.phillylinux.org> wrote: > > Yes, physical access does open up a lot of possibilities. > But Microsoft keeps claiming that it doesn't. I think most competent companies are using TPM-backed encryption for this reason. You can take advantage of OS exploits, but you can't just bypass the OS security entirely. Their main concern is laptop theft, but user tampering is also something that it prevents. Chromeboxes use TPM-backed encryption for user data only, but they use boot verification for the OS, which also prevents tampering. Those have a slightly different security model than typical Windows desktops. To be fair, most Linux distros do not support TPM-backed full disk encryption. They might let you set a disk encryption password, but in this case the user typically knows the password, and thus the user can bypass the encryption when booting from a rescue disk. This probably reflects that most big companies don't care about Linux on the desktop. > Windows doesn't really have file permissions at all, or at least > they're pretty much always not being used, or are being deleted > from files all the time. Maybe if you're talking about small companies. I can't imagine most Fortune 500 companies are deploying desktops without file permissions. Granted, some of them just worry about security on fileservers and don't worry about client PCs so much. Companies have been moving away from this in recent years for a couple of reasons: 1. They want to prevent users from storing data on local PCs where it is more vulnerable. 2. Ransomware/phishing/etc attacks are getting more common, and securing the local PC helps keep this stuff out. 3. Targeted laptop theft for espionage/etc instead of just petty theft is becoming more common, so they want to make sure the OS security settings aren't disabled if this happens. A lot of what you say might have been true 20 years ago, but I think it is less true today. Also, we're talking about antivirus software in this thread. Almost all corporate antivirus software phones home. If you go fiddling with it, and it doesn't phone home with the expected status, you're probably going to get a visit. I imagine that this sort of thing is not going to be tolerated for just about anybody. Maybe a star performer gets a very stern talking to and a chance to never do it again. Really though it isn't a situation you want to be in. My advice is to just let the company IT manage THEIR computer the way THEY want to, and just stick to the SOP. If you can't get your work done as a result, talk to your boss about it, and make it IT's problem. There are almost always ways to escalate such things. I stopped caring about how the company manages their hardware a long time ago - if I want to do something not company related I use my own PC for this. If I'm traveling or whatever I bring my own PC with me alongside the company one. I tend to pick ultralight laptops/etc as a result since they're mainly for travel. If I ever had to carry a company phone I'd just carry my own phone alongside it for the same reason - don't mix personal and employer stuff. -- Rich ___________________________________________________________________________ Philadelphia Linux Users Group -- http://www.phillylinux.org Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce General Discussion -- http://lists.phillylinux.org/mailman/listinfo/plug