Just a personal story to bring one example into focus.
I got sober 8 years ago and never talked about it online until I was about 4 years sober. Never saw a single promotion for anything related to alcohol…
Until the day I made a single comment on Reddit telling my story to help support another person who was just starting their own sobriety journey.
And like magic, all promoted communities to me were alcohol related. Even though I’m an ublock user, when I would selectively disable it every advertisement I saw online was related to booze.
So even though there are ethical applications for my data, I found that it was used in an attempt to target me based on human frailties.
Oh shit, you just reminded me of the time that I had to PHONE Macromedia to manually activate software because of the firewalling. This was after waiting days to get administrative permission to install it in the first place.
“Thank you” for helping resurface those horrible memories!
I cannot remember the specifics because it’s going back almost 15 years now but at one point…crontab (edit and other various vital tools) was disabled by policy.
To get necessary processes/cleanup done at night, I used a scheduled task on a Windows PC to run a BAT that opened a macro program which opened a remote shell and “typed” the commands.
That’s super true, so many times to stay ISO compliant (I’m thinking about the lottery industry here), security policies need to align with other recommendations and best practices that are often insane.
But then there’s a difference between those things which at least we can rationalize WHY they exist… and then there’s gluing USB plugs shut because they read about it on slashdot and had a big paranoia. Lol
The point is if they’re going to get access to your PC it’s not going to be to turn on a webcam to see a sticky note on your monitor bezel. They’re gonna do other nefarious shit or keylog, etc.
Mapping software that can give directions the way human navigator would.
When I’m driving in my own city, my mapping software should be intelligent enough to know that I am aware of most of the roads; it can track me.
I don’t need to hear
“Keep straight on Highway 101 West signs for Highway 101 West for 300m, then take exit 104 South signs for Highway 104 South, take exit 104A South signs for 104 South, merge onto Highway 104 South signs for 104 South. Go straight on Highway 104 South for 400m then take the left lane and turn left on route 40 Eastbound signs for route 40. Boodle-ding you are on the correct route. In 200m turn left onto route 40 Eastbound signs for route 40 Eastbound. Turn left onto route 40 Eastbound signs for route 40 Eastbound.”
… When what is needed in a realistic sense is the following:
“In 300m take the exit to 104 Southbound then after 400 m, turn left at the first set of lights onto route 40”
I made two posts one on asshole design and one on dangerous design and they cumulatively got something like 7,000 up votes and then “magically” the problem was fixed on reddit!
When they did this for the stated reason of preventing data theft via thumb drive, the mice & keyboards were still plugged into their respective USB ports, and if I really wanted I could just unplug my keyboard and pop in a thumb drive. Drag, drop, data theft, done.
Further to this madness, half of the staff had USB hubs attached to their machines within a week which they had purchased at dollar stores. Like…?
At any time, if I had wanted to steal data I could have just zipped it and uploaded it to a sharing site. Or transferred it to my home PC through a virtual machine and VPN. Or burned it using the optical drive. Or come up with 50 other ways to do it under their noses and not be caught.
Basically just a bunch of dingbat IT guys in a contest to see who could find a threat behind every bush. IT policy via SlashDot articles. And the assumption that the very employees that have physical access to the computers… are the enemy.
Okay I’ll concede that SOMEWHERE in the world there exists a condition where somebody has to prevent the insertion of an unauthorized thumb drive, they don’t have access to the BIOS, they don’t have the password, or that model does not allow the disabling of the ports. No other necessary devices are plugged in by USB. Policy isn’t or can’t be set to prevent new USB devices from being added to the system. And this whole enchilada is in a high-traffic area with no physical security and many with unknown actors.