this post was submitted on 01 Aug 2023
974 points (100.0% liked)

Technology

37702 readers
271 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] pglpm@lemmy.sdf.org 163 points 1 year ago* (last edited 1 year ago) (14 children)

I don't understand why so many opinion pieces and news keep on saying that Web Environment Integrity could be abused and that's why we should oppose it. This misses the point a great deal.

Implementation of Web Environment Integrity in browsers IS ITSELF AN ABUSE, because I have the right to go around the web without continually proving who I am, even less against a 3rd party.

It's as if someone said that some officer (and not even a government one) should always be by your side when you go out, ready to certify who you are, whenever you speak with people on the street – and even with friends. Would you accept that?

Are we totally out of our minds??

[–] skullgiver@popplesburger.hilciferous.nl 8 points 1 year ago* (last edited 11 months ago) (8 children)

[This comment has been deleted by an automated system]

[–] Joph@programming.dev 48 points 1 year ago (2 children)

That works until you are forced to interact with a website that only works with it, either by work or school.

[–] BarryZuckerkorn@beehaw.org 9 points 1 year ago (1 children)

That's already the case with most corporate managed BYO device policies. The typical scenario is that an employer gives you the choice:

  1. Use the company-owned and company-managed device. No root/admin access, no privileges to install unauthorized software, sometimes policies against personal accounts or files or use.
  2. Bring your own device, but consent to the company's IT department managing your security and potentially monitoring your use. If you're going to connect this device to the company's LAN (through wifi or VPN or otherwise), you're going to let us lock it down.

It's a legitimate concern that these types of things would normalize corporate-managed devices in our personal lives as consumers, and worth resisting in that space, but I don't think it would actually change the status quo in the corporate world to go from proprietary device management lockdowns to some kind of public standard for lockdowns.

[–] randomwords@midwest.social 11 points 1 year ago (1 children)

Which is exactly why I will never do 2. Provide a device if you want control. I will not give you the ability to wipe my personal phone remotely just to check my work email on it.

[–] WarmSoda@lemm.ee 3 points 1 year ago

Exactly. If you're going to lock down and control a device I'm going to need that device provided to me.

load more comments (5 replies)
load more comments (10 replies)