this post was submitted on 10 Nov 2025
343 points (100.0% liked)

Hardware

4437 readers
100 users here now

All things related to technology hardware, with a focus on computing hardware.


Rules (Click to Expand):

  1. Follow the Lemmy.world Rules - https://mastodon.world/about

  2. Be kind. No bullying, harassment, racism, sexism etc. against other users.

  3. No Spam, illegal content, or NSFW content.

  4. Please stay on topic, adjacent topics (e.g. software) are fine if they are strongly relevant to technology hardware. Another example would be business news for hardware-focused companies.

  5. Please try and post original sources when possible (as opposed to summaries).

  6. If posting an archived version of the article, please include a URL link to the original article in the body of the post.


Some other hardware communities across Lemmy:

Icon by "icon lauk" under CC BY 3.0

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] fonix232@fedia.io 22 points 4 days ago (1 children)

Every single access is logged on such systems, regardless what kind of file hosting you use.

An employee suddenly accessing tons of files, potentially in indexing order (meaning they're either clicking through every link, every folder, every file, or are using an automated tool that does exactly the same), now that's suspicious.

Combine that with logs from their terminal, which would usually contain things like downloads, file operations, as well as external storage connection/disconnection events, and you can basically get a near perfect map of what they stole and how.

[–] Cethin@lemmy.zip 2 points 3 days ago

They knew what they stored it on, so presumably they did it in a company computer, and that computer had logging software that the company got access to (whether it automatically sends it to them or just stores it locally until needed).