Remix.run Logo
JuniperMesos 3 hours ago

I already assume that on a work computer everything I'm doing could be monitored by work IT. At every job I've had, I've made a point of not using work hardware for anything I even remotely thought someone at the job might object to. Instead I use my own hardware for that kind of thing - I own a smartphone, I own multiple computers, this is not hard to do.

When I worked at a startup that had some internal conflict between the software engineers and management, someone made a Signal group to chat about the issues among the software engineers privately and everyone joined that group with their own Signal accounts, without any kind of issue.

catcowcostume 31 minutes ago | parent [-]

> Yes they could have accessed logs before but there’s a difference between directed checking after incidents and active surveillance at scale.