Web-Based E-mail Isn't Safe From Corporate Eyes 212
Ant points to this CNET story, a snippet from which reads thus: "[S]ecurity experts say many employees would be surprised to know that Web-based email services also offer little privacy. Messages sent via a Yahoo or Hotmail account, or through instant messaging products, such as ICQ or America Online's Instant Messenger (AIM), are just as accessible to nosy employers." I know some people who this ought to make nervous;)
Pine rules! (Score:2)
BTW, I know that I should use something better like mutt. I've been using pine for over 6 years and I am just to lazy to relearn.
--weenie NT4 user: bite me!
Re:Which is why I always ssh home... (Score:2)
So do I.. If I'm sat in my cube when I do anything net-related my employer is welcome to watch it - If they can show me a single instance when I mised a deadline or otherwise didnt get the work done because of it then I'll deserve anything they throw at me but I have no worries there because there are no such incidents. All the same, there isnt any reason I have to make it easy for them, the only way they can read any email I send from my home accounts is either to do screen/keystroke capture (which I'd know about pretty quick as I regularly sniff my own network traffic as part of my job) or pull a fullscale man-in-the-middle attack on my ssh connection to my home LAN at the corporate firewall. If they are that paranoid and want to waste that much time and resources on the project then they are welcome to. If my boss wants to sink that much budget into completely non-productive tasks then he's on a bigtime losing streak and I'll soon have his job myself. Alternatively if he is getting pressure from upstairs to account for my net traffic all he has to do is ask and I'll hand him a logfile. With nothing to hide theres no loss in telling them what you're doing, its just polite for them to ask for the info rather than simply grab it.
# human firmware exploit
# Word will insert into your optic buffer
# without bounds checking
If it isn't encrypted, it isn't safe! (Score:1)
I do all my private email and IRC via SSH when at work. I also do use ICQ because many friends are on it, and I do realize that it is unsafe, so I watch what I say if it's something I don't want anyone else to hear.
Wouldn't it be great if all those silly little chat clients were encrypted? How long is it going to take for someone to develop one and have it catch on enough to where all your friends are using it? That'd be nice. (the second part is the hardest part for sure)
In the mean time, I'll stick with SSH and my shell account. Of course, I'm lucky enough to work at a place where the port is open through the firewall...the last place I was at had the great firewall of china. Only way to telnet was through a gateway. If it wasn't HTTP it didn't leave the place...
--Mike
harlock@raindrop.com
www.raindrop.com [raindrop.com]
Re:The ineptitude of management (Score:1)
I think your post misses a key point. Most companies do not implement auditing to encourage good work ethics. It is done primarily for accountability. As someone already said in this discussion, the computers of a company do not belong to the user, but the company. For the same reason, the company is responsible for their use. If a computer is being used for non-business, illegal, or malicious purposes, they have to be able to hold the appropriate person accountable. I am an engineering consultant and have been in many environments that audit certain computer use. I can tell you that rarely, if ever, do most companies actively track audit records (except maybe for statistics generation like: most visited site(s) this month). It is usually done ex post facto (after the fact). In other words, it is done to see who performed some certain action after it has already been performed. Most audit records would go untouched if there were not a reason to review them. Auditing is something that is and should be used by responsible admins.
BTW- Auditing can also be effectively used to troubleshoot certain problems as well as foresee future ones.
Re:Not really . . .. (Score:1)
Re:Not really . . .. (Score:1)
Just started using Debian last week after too much RedHat... Thanks for the info, might save my Axx some time! :)
--8<--
Re:Money (Score:1)
Re:Simple Rule of thumb (Score:1)
Re:Not really . . .. (Score:1)
Which is why I always ssh home... (Score:3)
I'm reasonably sure of my system security there, since I installed the system myself. It's kind of a pity I have to view my employer as my enemy, but the corporate world's pretty much proved they are anyway.
Re:Mezmerize (Score:1)
Repetition sells.
Re:Not really . . .. (Score:1)
-actual mileage may vary
oooooooooooooh! (Score:1)
Re:What is this doing on Slashdot? (Score:2)
Technical know-how has no relationship to how intelligent a person is, I'd expect an English major to know that.
Second Law of Blissful Ignorance
Re:Not really . . .. (Score:1)
The problem is when a company already has people that their job is to keep out an eye on employees. If they are told to watch for stuff coming out of e-mail then the boss, who doesn't know how to, could tell them to also watch for freemail services. Most (all?) employees need to go through a company server to get on the net, and because the freemail services only encrypt log-ins (exceptions apply) they smart network admin guy can the set-up filters to record mail being sent to/from hotmail, yahoo etc.
The lesson however is encrypt the connection from the start all the way to the log-off. If Yahoo or Hotmail does this, there will be a jump in the number of other freemail services who offer the always encrypt option.
--
From: Aaron "PooF" Matthews
Re:Don't count on it! (Score:1)
Note that keystroke logging will let them read mail that I'm writing, but they'll need something a bit more powerful to figure out what I'm reading. Keystrokes logging will let them see that I typed:
Not very informative if you're tring to see whether the bad guys are sending me secred messages. OTOH, they can read my password unless I'm truly paranoid and bounce back and forth between the place where I'm typing it in an another text box where I type gibberish.
Fortunately, I don't work somewhere paranoid enough to do that kind of thing. Heck they let me install SSH on their machines without complaint, which no organization that was really paranoid about security would do, and they let me plug my laptop into the company network- so I can actually be reasonably confident that on at least one computer they aren't doing keystrokes monitoring. Part of the reason that I like my current job and haven't gone somewhere that would pay a lot more is because I like that kind of attitude; I'd advise anyone who's really worried about this stuff to consider that before they jump straight for the job with the best pay.
Oh no... (Score:1)
Yep. (Score:1)
If you don't want the company to see it...don't do it on their network. Done. 'nough said.
Re:If this surprises anyone... (Score:1)
Re:Any good SSL/web based packages ??? YES! (Score:1)
You'll need to install MySQL, Apache-SSL (if you want to be secure and encrypted :) and horde as well, but the dependencies will take care of that. (I just LOVE apt! :)
If you choose to install it, my recommendation from personal experience is to install MySQL first (by itself), set the MySQL root password, then install imp/horde/apache-ssl.
Requires a bit of tweaking of the Apache files, but hey if I can figure it out, anyone can. :)
Cheers....
The cause of confusion... (Score:1)
However, let's not forget the Slashdot story [slashdot.org] that Yahoo! will soon begin offering encrypted mail. That's a certain exception, and should prove employer's snooping efforts fruitless. Right?
This is nothing new (Score:1)
If you can monitor what web page URLs employees visit from the office, it is trivial to monitor the HTML content of those pages as well. Other protocols likewise can be easily decoded. I do not see what the big deal is here. Employers likely could pick up your password from many of these web-mail systems with ease at their Internet gateway.
Even if a page is https:// encrypted, I can think of a proxy game good enough that most "secure pages" could likely be made readable by your employer as well.
On the other hand, at my university of all places, the administration has set up keyboard, screen, and local disk drive file monitoring in many of the computer labs. I do not know if the monitor network traffic (yet). Talking about taking "usage implies consent to monitoring" to an extreme. But I have yet to see anyone be discouraged from using the systems, or stop from installing personal programs on them, despite the risk of losing their network account.
Re:Many corporations block outbound SSH (Score:1)
Connect to port 80 of the SSH server:
Send GET / HTTP/1.0
The hacked up SSH server ends up sending..
HTTP/1.0 Okay
SSH-1.5-1.2.25
And then the SSH transaction proceeded as normal...I dunno if this would work with all proxy software, but if its just a simple port blocker, you might not even need to do this, just talk on port 80...
If anybody wants the patches for my hacked up ssh server let me know...
Re:encryption (Score:3)
There is a plugin called PGP For ICQ [samopal.com] that will allow you to encrypt ICQ messages, and I think that PGP 7.0 has this built in. The linked plug-in has source code also (as of now source for 0.5 only, the current release is 0.9)
Correct me if I'm wrong...
--
From: Aaron "PooF" Matthews
herm... (Score:1)
*sarcasm* I never woulda thought...*/sarcasm*
Big deal (Score:1)
You want security, use GPG-encrypted mail through SSL tunnels on both the SMTP and IMAP sides on a mail server you own on bandwidth you pay for. And make damn sure your machines are physically and electronically protected, are running Unix, are behind a firewall, and are well-maintained. If you need more security than that, I'd suggest something involving code names, lasers, high-frequency burst transmissions, and guys wearing trench coats milling around in a fog-bound park.
Re: maybe at YOUR workplace... (Score:1)
I'm glad to see this display of morality by a government employee; however, I wish that I'd seen the same from someone higher up in the government ladder (Slick Willy).
Re:Not really . . .. (Score:1)
Re:Use hushmail (Score:2)
In any case messages to/from non-Hushmail users leave/arrive in non-encrypted form. That's still too much openness for really sensitive messages.. If you really want to protect your messages, you should send and receive with public key encryption.
I have to admit that I've used web mail to avoid sending email through an employer's server. This wasn't actually my choice -- I was working for a job shop that asked me to communicate with them this way. But, as this news item points out, I wasn't really gaining any privacy. If the portal company had conspired with my emplyoyers...
As with any security measure, securing your email is a question of making it too much trouble for people to crack with perimeter. If you think you're getting absolute security, you're fooling yourself -- and that's more dangerous than no security at all.
__________
My experience running the corp proxy (Score:2)
Re:Not really . . .. (Score:1)
Re:Use Licq! (Score:1)
Hmmm I wonder if the managers two or three levels up realize the guys at the bottom can sniff just as easily as the IT department :)
AIM-ssl anyone? (Score:1)
(gazes off into the distance, as Garth would) It just seems too easy...
Seriously, though: If this could be in high demand, e-mail me and I'll consider using my 5th period (Directed study... Only no one else can figure out what I'm doing
-Brian
Re:Encryption doesn't matter (Score:1)
We were using it for a while at work, so we could restart server processes without getting up off out arses and walking over to the server. (Incidentally, I guess that tells you we aren't using UNIX) Anyway, I was working one day, and noticed that the mouse was moving around on ther server, and the only person who should have been on VNC was me. Freaked me right out... Upshot of it is, we don't use it anymore
Another good reason... (Score:1)
Use the anonymizer! (Score:3)
This assumes that you have some way of setting up SSH locally, and that there's no keystroke monitoring going on. In both cases, you're probably better off if you have a linux box.
GP
The CEO's wife (Score:4)
--
I really don't think that they care... (Score:1)
Just my worthless
- Bill
What about Desktop On Call? (Score:1)
When I get to work I simply open up a browser window and connect to my computer at home, then I can ICQ to my heart's desire while downloading songs from Napster and working on my web pages from home. How easy is it for my employers to see the data I transmit if it is going through a java applet?
Anyone else doing this?
The URL (Score:1)
www.licq.org [licq.org]
Silly me, I should have thought to post it. It really is an excellent peice of software.
Re:No they dont deserve it (Score:1)
If you don't like the rules don't play the game.
Re:Use hushmail (Score:2)
Re:Not really . . .. (Score:1)
If you're really paranoid you can get around keystroke monitoring by going to a frequently updated website such as Slashdot and using copy and paste to put letters and words into you're [sic] message.
Umm...no. You are dumb.
Not really . . .. (Score:2)
Re:SSL won't cut it either... (Score:1)
encryption (Score:1)
Serves them right (Score:4)
Re:Not really . . .. (Score:1)
Then encrypt it BEFORE you type it in. Print up a page of barcodes representing the standard printable keys on a keyboard, and use your :CueCat scanner to type. Let them try and decipher THAT plain text :)
A very evil NipokNek
Doesn't it depend on the business? (Score:2)
many of which explicitly said so. I don't
understand why you think it's problematic if
they don't think it is, especially if they
explicitly say so. Many places one might work
have the idea that being nice to their
employees is good business. I imagine you think
this is a strange concept?
Re:yes, but what if they block the host? (Score:1)
Let's not forget proxies... (Score:2)
But I'm sure it's not a problem that a bored Perl programmer couldn't help out with
--
Re:Use hushmail (Score:2)
If you don't know the rules, don't play the game.
No they dont deserve it (Score:2)
Imagine if my conservative company has a list of words they like to keep track of going over their network, like pot, work sucks, aids, etc. I IM or email a buddy about getting high, think that I could have a terrible illness, or what parts of my job suck and now the admins go and tell the execs that I'm suddenly high risk. They could easily come up with some bullshit reason to fire me, like "not being a team player."
What they won't do is read my email off to me and say "Okay looks like you've smoked pot before and don't like 3 people in your department, it says it right here to the people you emailed over the last six weeks."
In other words they won't admit to violating my privacy (which last I checked they dont have a right to if its on a remote server) but will easily use that information against me.
SSL protection for AIM and email (Score:3)
Using services like http://www.pop3now.com [pop3now.com] will let you access POP3 email through the web while protecting you from your employer's prying eyes.
There are also other SSL wrapper services out that will get you out of untrusted workstations. However, keep an eye out for programs that record keystrokes and/or record screen activity.
So? (Score:2)
Seriously, though, anybody who knows how packets flow across the internet knows that ordinary email, non-secure web forms, etc., are the electronic equivalent of post cards. Expecting anything approaching privacy from them is just plain silly. If you don't want your boss, the Yahoo webmaster, or the NSA to know about your tastes in software porn (I'd find it embarrassing, but it wouldn't be the end of the world) do some elementry public key encryption. That's enough for most purposes -- ordinary encryption is all too easy to crack, but most of us don't have secrets that are worth the trouble.
If you're sending something really sensitive (ho hum, another hippie wants to overthrow the government), make a serious study of encryption issues.
If you're sending something really really important (it will cost somebody money if the fact gets out), use a fax machine.
If you're sending something really really really important (your competition actually cares about what you're up to!), call FedEx.
__________
bah. (Score:2)
Re:Not really . . .. (Score:3)
This would only apply if employees were concerned with employers snooping internal communication. Unless these employees each have a personal line to the Internet, the shared pipe out provides a pretty good perch to sniff from.
Switched networks aside, it's not the executives that are setting up monitoring. It's the net admin. If they can't set up a sniffer they shouldn't be in charge of this stuff. They also don't need anything too specific. Even the most rudimentary sniffer will be enough to get whatever an employer wants.
Along the lines of the point to point solutions such as SSL'ed web based e-mail, hushmail and the like, you're really just upping the ante for the system administrator. The article (if anyone actually ever reads the articles slashdot references) make a good point of keystroke grabbers, etc. It's always possible for an adept admin to trojan your box for "official business." If it ain't your box, you lose. Very few ifs, ands, or buts about it. Hell, a really persistent admin can grab PGP keys out of memory and escrow :) them for you.
Bruce Schneier's new book has great stuff on these extremes and how they aren't as extreme anymore. He puts it best throughout his book with the futility of trying to protect data using as system you don't control. He mostly looks at it from the angle of the user being the attacker, but obviously the concepts apply in the reverse. This time the chump sitting at the keyboard is us.
If it ain't yours, don't trust it.
StephenRe:Who said this was about sensetive info or porn? (Score:2)
Anyway, if your boss is totally indifferent to your privacy, he's going to forbid you to use hushmail isn't he?
If you're really concerned about workplace privacy, you should discuss it openly with your employers and get them to set an explicit privacy policy. Imposing half-assed encryption solutions on your own gives you nothing but a false sense of security (pun intended).
__________
Many corporations block outbound SSH (Score:2)
SSL is a much better solution, no employer is going to block outbound HTTPS connections without good cause.
There is no protection (Score:2)
Re:Content (Score:2)
Not usually. (Score:2)
So usually if clients visit a HTTPS site, it's encrypted all the way. Maybe your network is really set up differently, but have you really checked? Run a sniffer and see. I have for mine, and it's satisfactorily encrypted.
Basically the clients contact the proxy, and then issue a CONNECT dest.ip.address.blah. The proxy makes the connection, then you have a channel between the client and the destination server. You don't even get the URIs in the proxy logs.
However, over here, users must still log in to the proxy server to have internet access. So if they really misbehave it's not too difficult to track them.
Tracking severe abuse is quite simple and doesn't require any spying of payloads or even urls.
When the Boss asks "Why is the Internet connection so slow?" or worse "Why are the emails slow" then the people who have been downloading movies and mp3s better watch out.
Link.
Re:Not really . . .. (Score:2)
# passwd
--8<--
What is this doing on Slashdot? (Score:2)
-
The information is essentially being sent back and forth via text as long a wire. Anyone along that wire, inside or outside of your company, has the ability to intercept, read and change the text," said David Kennedy, director of research services for ICSA.net in Reston, Va. "Is it technically possible? Yes, and it's fairly easy to do."
For Slashdot to sensationalize what is basic knowledge to anyone with a smidgeon of technical know-how (my girlfriend's an English major and she knows this) and make it seem like there is some sinister plot underway by AOL, Yahoo, MSN, etc to cooperate with employers to steal employee rights is irresponsible.Second Law of Blissful Ignorance
Correction on the proxying https:// part (Score:2)
I should note that the scheme I can thought of to proxy https:// pages so an employer can read them in real-time does give the fact that it is there away in most cases. This is because all https:// traffic would be routed through a server (say spyonssl.mycomp.123) that would then establish its own secure connection to yourbank.456 or whatever. URLs and referrers would be rewritten to keep everything working. This would be required without your employer becoming their own certificate certifying authority, because most web browsers will complain bitterly if the certificate does not match the site. Most users would likely spot this, unless the secure page was quickly switched away from.
Of course, no one is stopping them from installing their own certifying certificate on your PC, generating fake SSL certificates in near real-time on a fast computer, and playing a "man-in the middle" attack that few people would know how to spot. But now, we are *really* getting paranoid... and so are many employers nowadays. It is likely that at least a few companies out there have systems that try to decode your secure web pages out there, even if it means taking a year or two with a Cray...
One should realize that most web-email services do use secure https:// for the login, but send your mail as insecure http:// . So they likely can't get your password too easily, but they can get everything else. As we speak, companies are likely working on the former, considering it a "trivial issue" that needs to be overcome. Given that most people only use one password for everything, I would not be surprised if many employers can guess your web mail password anyway.
Re:Not really . . .. (Score:5)
For starters, many, many companies still use hubs for their networking. If you are plugged into a hub then you can hear anything on your subnet. I have personally worked with small to medium sized companies, with tens to thousands of users, who still link end stations to the LAN with hubs. In these cases snooping by the boss is actually less of a threat than your neighbor running an SMB sniffer and cracking your clever M$ password of "password".
Second, with the proliferation of intrusion detection system it is becoming less and less possible for your traffic to not be examined. Large organization use IDS not only on their Internet connections, but on their internal networks as well. This is because a majority of security viloations occur on the inside of a network. By definition, an IDS system must hear everything that happens on a segment it is to protect.
Third, bosses may not be technically capable of setting up a sniffer, but they are very aware that the opportunity exists. They will order the use of sniffing technology if they believe that they must use it to accomplish something. In practice, they will only do this if there is a significant reason to do so because of legal liability.
Fourth, something like 60% of US companies actively monitor their employee's use of Internet resources. They may not look at each payload, but if you are spending 50% of your day going to Hotmail with your browser, chances are that they already know about it.
Remember that in the US the current opinion is that if you are using a company's computer then the company owns the data input into or produced from that computer. If you are doing something that might be a no-no, you'd better not do it.
RSA is free (Score:2)
Is ssh1 more secured? (Score:3)
How secured is ssh1? Can people still sniff this beside reading off my monitor? Once in a while, I have personal stuff (nothing illegal) that I don't want people to read.
TIA for replies.
Re:The ineptitude of management (Score:2)
Any management that thinks auditing is an effective way of encouraging good work ethics is insane and grossly inept and should be fireed immediately. Any manager that sees low productivity or low morale and thinks the solution is to start snooping on employee activities should give up and become a basket weaver. I am not kidding.
While this is all true, there are many situations in smaller companies where this doesn't work.
My workplace is a case in point.
We used to be a division of Litton [litton.com], but were sold off because we weren't part of the "core business".
The guy who bought the company, our old GM under Litton, is paranoid.
The boss knows enough about computers to have mirrored his Windows 95 installation up through every machine he's had since his 486DX-33, but still doesn't know why it's dangerous (or why he can't make a partition bigger than 512 megs).
The boss is paranoid enough that while he wants me to administer the mail server, he also doesn't want me to have access to the mail. Same with the fileserver.
The boss wants to be able to watch *everything* going across the LAN at all times and is willing to sit in front of the server in my office to do it.
That's the mentality you might have to deal with. If you can't, get another job. Things were great while we were a Litton company - the philosophy in our division allowed everything but XXX sites and *excessive* non-profitable useage - but since our old GM became our owner, the paranoia has increased and things have gone downhill. I'm looking, as are most of the rest of our staff.
Ever hear of the ECPA? (Score:2)
Re:75 users, 16 hours a day, Who's gonna do it? (Score:2)
Lots of people get off on snooping in other people's business. This is why 'reality' TV shows are such a hit.
Now imagine you're the boss or the network guy, and there's an employee you don't like using AIM and you've got a few min to spare. You don't think there's a real chance that people might casualy skim through your stuff? And if the boss(or network guy) is out to get you fired then there's a serious chance people are going to look through your stuff.
The ineptitude of management (Score:5)
Any management that thinks auditing is an effective way of encouraging good work ethics is insane and grossly inept and should be fireed immediately. Any manager that sees low productivity or low morale and thinks the solution is to start snooping on employee activities should give up and become a basket weaver. I am not kidding.
The only true measure of an employees worthiness is output and nothing but. This is a very important concept as we move to more telecommuting/contract type employment anyways (and boy will the lines get blurry when employers are monitoring employees in their own home). The vast majority of us in this business get paid by salary, not by punching a card in a clock, and while there are some general expectations regarding hours, generally the salary structure is based upon perforance not time. For our salary we are expected to contribute a certain amount of worth to the company versus the salary that we are receiving. If an employee doesn't contribute that worth then firstly examine the management structure and corporate supports to determine if they are the problem, and if not FIRE THEM. That is the only way to manage effectively in the information age. If you've got some company outcast sitting in a room packet scanning whether someone is using hotmail then you've got your priorities totally messed up : There are a million ways of wasting away time and if you think you're creating a super efficient workplace by totalitarianistic network policies then you are completely ignorant of the real world.
If you have a worker that you think might be dicking away a lot of time simply set goals and performance requirements and you should have a system in place that measures metrics (not keystrokes as that is worthless, but some other metric). Reward exceptional performance and punish under performance. The time an employee needs to accomplish that goals is irrelevant. Obviously if someone is sending offensive mail from a company email address that is poor judgement and should be punished, however if someone is sending emails to friends on Hotmail you really shouldn't give a shit if you have the performance metrics and good measurement systems. If you think you will improve the worthiness of your company by instituting superficial monitoring systems then you are will soon be out of a job as your company will be out of business.
BTW : For the corporate outcasts that feel the supreme justice of being the one's "in charge" of monitoring employees : Firstly these systems are never unbiased -> It is usually targetted at whichever persons these losers feel a dislike towards recently. Secondly there is no justification based upon what I was saying above (except for a few positions which are more time based : i.e. answering phones). Pathetic claims about "company resources" and the like are ridiculous. Do you abscond from drinking lest you use the sacred company water pissing? Do you partake of company provided refreshments? Do you happily request a 14" monitor over a 19" because really netmon runs just as good at 800x600? If not then shut up : The "wear and tear" on a computer system for someone to visit hotmail is rather minimal and of minimal costs.
Encryption doesn't matter (Score:3)
Too many companies these days are installing clients that allow them to see your screen. Typing an e-mail? They can read it while typing. Talking on ICQ? They can get the conversation, too.
The PGP/SSL argument's don't hold water. If they see you doing something personal, either by sniffing or peeking into your computer, they can monitor whatever they darn well please. And read whatever they want to. And watch what you're doing.
It is impossible for you to hide what your personal web usage from the IS department. There are no solutions when they can take over your monitor from another box and packet sniff.
Re:Use hushmail (Score:2)
Of course, Hushmail doesn't encrypt its client-server connection. That does protect you from your boss -- but do you really want to work for somebody who spies on his employees?
Hushmail does offer digital signatures -- but all that proves is that your email headers aren't forged. It doesn't prove that the owner of the hushmail account is who he says he is.
__________
Re:Another good reason... (Score:2)
Not even breaks are safe.
To keep the stuff I really want to keep private private. I use my palm pilot, modem and TGPostman over a VPN link to home to get and send my email. Sure thay can tap the phone, but all they will get is encrypted garbage.
ANother rule. (Score:2)
Treat any traffic generated as a public radio broadcast. You have no control over who sees it.
Re:Not really . . .. (Score:2)
The usage of SSL like on http://www.Hushmail.com would be the only way to get around it
Not really. Sure, it'll keep things private from a sniffer, but as the article pointed out:
Keystroke monitoring is an even more extreme surveillance tool that enables employers to read every key employees push--from the URLs of Web sites to email and instant messages, including deletions or changes they make in the process.
Some programs, including the Silent Watch software that tracks employee computer use, retail for as little as $39.99. As many as 35 percent of all corporations already have these systems installed, according to Internet surveillance company Websense.
The keystroke monitors can capture what you type, even before it is encrypted!
Instead of engaging in a contest of cat-and-mouse with my employer, I look at it that I am there to provide a service for which I am paid. If I cannot realistically justify an on-line activity while I am at work, then I just wait until I get home. Keeps it simple.
For example, I had a close relative who recently had major surgery and made a few e-mails (and phone calls) to keep in touch as to how the surgery went, when the visiting hours were, etc. I can't imagine my employer having trouble with that. I wouldn't work for a company that was so lacking in compassion.
woops (Score:3)
Monitoring AIM (Score:2)
SSL (Score:3)
Re:Whose computer is it? (Score:2)
//rdj
Re:SSL won't cut it either... (Score:3)
The proxy can sniff the traffic, but they then need to decode the SSL...
Use hushmail (Score:5)
Re:What about Desktop On Call? (Score:2)
Well, that depends - it's still an IP stream, and the packets are still going through your employer's network so they can sniff the packets. Whether or not they can understand those packets depends on whether the applet does encryption at all.
--
Re:Not really . . .. (Score:3)
It's not some rogue boss who has a sniffer that people dislike... it's when the company itself officially tracks things. THat means the IT dept. is involved, and that means they CAN do it.
LAN admins can snoop? Isnt' that missing the point? It's the IT departments job to manage all aspects of information technology, including hte lan. If the company has a mandate to analyze that traffic, then it is the IT department who would do it.
And what happens when the line gets fuzzy? (Score:3)
Basically, I wouldn't work for an employer who was so paranoid that this arrangement made me nervous, and I would encourage others to consider whether they should. I'm a fairly decent systems programmer and administrator, but I don't believe that my leverage with my employers is excessive. On the other hand, I also don't try to rip off my employers or do a substandard job, which sometimes seems like apostasy in modern-day working America, so YMMV.
Re:Let's not forget proxies... (Score:2)
Don't know the product name, but that was 2 years ago.
Re:Encryption doesn't matter (Score:2)
---
Re:SSL won't cut it either... (Score:2)
--
Re:Ever hear of the ECPA? (Score:2)
A previous employer of mine thought this wasn't true; their lawyers, the top-rated law firm in that state, set them straight.
-
Use HTTPS for Browser Mail? (Score:2)
I've wondered about this before and can see this being an attractive marketing tool for the privacy consious.
From the can-you-say-duh dept... (Score:2)
Re:Another good reason... (Score:2)
Re:Whose computer is it? (Score:2)
If an employer thinks that I am just a machine, capable of nothing but churning out code, and that I enjoy nothing more than staring at pages and pages of PERL for the 50 - 60 hours a week I'm in the office then thats fine. I can get other jobs. I'm in my last week at my current job, my primary reason for leaving is a restrictive web surfing policy. People who vote with their feet and leave jobs because of this are rare, but I'm one of the few.
Whose computer is it? (Score:2)
Moreover, it is not your God-given right to customize the computer. Yet when some twit installs the latest Leonardo DiCaprio screen saver and it breaks all of the applications installed on the machine, said twit still feels entitled to yell at the poor tech from the IT department who is dispatched to fix the problem, and removes it.
You want to do personal stuff? You want to customize? You want to use the computer for any reason other than to do your job? Then go home and use your own computer. I can see this getting modded down by someone who wants to use their computer to goof off at work, but think about it. If your employer is ok with you casually surfing the web during slow times at work, that's fine, but in the end it's their computer and they make the rules.
--
Re:Not really . . .. (Score:2)
Re:Whose computer is it? (Score:2)
However, as another poster said, the best and ONLY criteria for measuring performance is by productivity. If I'm producing a satisfactory level of results, then it shouldn't matter how I get there. If I'm not, then I suppose stuff like `net usage would be a legitimate beef.
If this surprises anyone... (Score:5)
then they probably deserve what they get.
If it goes over a company network, there is always the chance that the company can intercept it. Live with it.
Do I let it worry me? Well, if the company wants to listen in to my IM conversation between my wife and myself, they are welcome to hear all about who's turn it is to pick up the kids, or who has to stay late. If they want to tap my email, they can read all they want about my opinions about some book, show, or event in some mailing list or other. I am very careful to not post anything that would be considered undesirable from work, and fairly careful to limit "ok" emails.
You want to send inflammatory material? Do it from home.
Many corporations block outbound *port 22* (Score:2)
So they block ports 22 and 23. So what? Just pick another one that they haven't blocked. Like RealAudio...
/usr/local/sbin/sshd -p 7070
Use Licq! (Score:2)
If you are paraniod about people snooping in on your instant messaging, use Licq and get your friends to do it to!