Q. Is this really as harmful as you think?

A. Go to your parents house, your grandparents house etc and look at their Windows PC, look at the installed software in the past year, and try to use the device. Run some antivirus scans. There’s no way this implementation doesn’t end in tears — there’s a reason there’s a trillion dollar security industry, and that most problems revolve around malware and endpoints.

  • DarkSurferZA@lemmy.world
    link
    fedilink
    English
    arrow-up
    42
    arrow-down
    1
    ·
    6 months ago

    I get the security issues, sure, those are valid, but the privacy ones are even worse. Imagine a teenager trying to search information on being gay, or possible intrusive thoughts on their family computer, only for their super maga right wing parent to find it in the screenshots.

    Or someone being abused at home and searching for support facilities, deleting history and being outed by recall.

    Wait, how about credit card fraud as a result of EVERYONE who has access to this computer can read your cc data?

    Or, my husband was looking at jewelry online yesterday and he hasn’t told me, he must be cheating, right? Oh sorry, I forgot, our anniversary is next week… Hahahaha, don’t be upset babe.

    Best one ever though, imagine your search history, your porn watch history accessible to anyone with access to your computer? The fucking horrific existence of having an employer process this data at scale using fancy staff monitoring program 7, and run stats on the fact that you had a toilet break while working from home, and they want to know if it was a number 1, or a number 2 so they can work a mean time to shit metric into your KPA/scorecard.

    Guys, whatever benefit you think this is. It’s not worth it.

    • ArcaneSlime@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      4
      arrow-down
      4
      ·
      edit-2
      6 months ago

      Not that it solves the problem, but since I’m not the King of M$ this is about all I can do: you could easily get around all that by turning off secure boot and booting into a persistant live-usb containing a linux distro of your choice (Tails for extra privacy/ease, if you can use Tor) to do all your secret agent computing needs. The host PC can’t see shit of what happens on Tails.

      Edit: lol you downvoted me because I can’t singularly change an entire corporation’s mind and instead offer workable solutions that you could make within the next 30 minutes to mitigate the problem until such time as your plan for Microsoft domination comes to fruition and you can change it back?

      Ok I guess, “chump don’t want no help, chump don’t get no help. Jive ass fools ain’t got no brains, anyhow.”

      -Barbara Billingsly