Imagine your search terms, key-strokes, private chats and photographs are being monitored every time they are sent. Millions of students across the country don’t have to imagine this deep surveillance of their most private communications: it’s a reality that comes with their school districts’...
I might have the exception to this. I’m able to dual boot my work laptop, as can the other engineers in my department. So it’s effectively a Linux machine under my exclusive administration. The only request from my IT department was how to format the host name.
I’m still not taking chances with that thing though, even when on my home network. The rules exist even if there’s a 99.99% chance they won’t be enforced. I have nothing to gain from doing nefarious shit on it just to prove a point, lol.
I might have the exception to this. I’m able to dual boot my work laptop, as can the other engineers in my department. So it’s effectively a Linux machine under my exclusive administration. The only request from my IT department was how to format the host name.
I’m still not taking chances with that thing though, even when on my home network. The rules exist even if there’s a 99.99% chance they won’t be enforced. I have nothing to gain from doing nefarious shit on it just to prove a point, lol.