this post was submitted on 30 Jan 2026
227 points (98.7% liked)

Technology

79985 readers
3106 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

Look, we all knew it was coming, but now it's official. Microsoft just handed middle managers the ultimate weapon. Their new update for Microsoft 365 allows companies to track exactly where you are, and the days of pretending to be at your desk are over.

you are viewing a single comment's thread
view the rest of the comments
[–] wizardbeard@lemmy.dbzer0.com 100 points 3 days ago* (last edited 3 days ago) (6 children)

While making this easier to access isn't a positive, there are a ton of ways that this can, and already is, being done at companies that actually care about this shit.

Yeah you're totally in the office, but your laptop just magically has an IP from the subnet for devices connected over VPN πŸ™„

Once again I must insist that people need to stop expecting any privacy on work devices. It is possible to find out anything on them, including location, it's just a matter of how much effort your workplace is willing to expend on looking.

Edit: While I appreciate the article being short and to the point, a link to any documentation on this would have been nice. The claim is that it will display the SSID of the Wi-Fi AP you're connected to. While being able to get that from your phone is a new bit of reach, it's possible to gather that from work devices easily.

[–] atomicbocks@sh.itjust.works 22 points 3 days ago

Any company going this far will almost certainly be requiring device management on whatever device you put your work email on. So if you have your email on your personal phone the likelihood that they can already track your location 24/7 using your phone’s gps is extremely high.

[–] corsicanguppy@lemmy.ca 18 points 3 days ago (1 children)

You don't know how Cisco is triangulating your laptop's position from APs in range, do ya? It's 2015 tech, and it's insane.

Being able to see where everyone's cell phone is in the middle of an open-air concert ... and whether and where it has been on the muni network since ... has been valuable for cops looking to question a potential witness.

But yeah, if you're reading this in the company loo, your IT people probably know, if they cared. They don't care.

Hell, knowing when the boss's phone lights up on the site wifi was great for ambushing him with a purc req first-thing. ..or so I hear.

TL;DR: they don't need to know which IP range you're on, as their layer-1 has already ratted you out.

[–] hodgepodgin@lemmy.zip 7 points 3 days ago* (last edited 3 days ago)

my direct supervisor has showed me what information he has access to w.r.t. wireless client information, such as client position.

My first thought would be how that is even possible, but given the fact that we record the location of each AP install, this makes a lot more sense.

[–] chocrates@piefed.world 12 points 3 days ago (1 children)

I'm more worried about them listening to my mic and recording my camera at this point.

[–] lightnsfw@reddthat.com 6 points 3 days ago (2 children)

That's why mine's pointed at my dick 24/7. Wouldn't want them to miss anything.

[–] pastermil@sh.itjust.works 1 points 2 days ago

So you point their mic to yours! They definitely won't miss that piss!

[–] regedit@lemmy.zip 1 points 2 days ago

Comment matches username!

[–] thisbenzingring@lemmy.today 9 points 3 days ago (2 children)

just use vpn all the time, even when at your desk in the office

[–] TipRing@lemmy.world 9 points 3 days ago (2 children)

This will break a lot of applications.

[–] thejml@sh.itjust.works 22 points 3 days ago (1 children)

This is literally how our corporate network is setup. You MUST be on vpn or you cant get to anything. Makes the access permissions super simple. Prior to this setup there were authorization settings that differed between on-prem/off, on vpn or off, which office you were in, etc. now they just deny all unless you vpn in and then it uses your vpn account to validate access there, in one place. Saved a lot of headaches.

[–] TipRing@lemmy.world 3 points 3 days ago (1 children)

That is certainly a direction. I hope you have robust redunacies on the concentrator.

[–] rainwall@piefed.social 6 points 2 days ago* (last edited 2 days ago)

The above is just modern network security. The model is called zero trust.

Zero trust assumes there is no implicit trust granted to assets or user accounts based solely on their physical or network location (i.e., local area networks versus the internet) or based on asset ownership (enterprise or personally owned). Authentication and authorization (both subject and device) are discrete functions performed before a session to an enterprise resource is established. Zero trust is a response to enterprise network trends that include remote users, bring your own device (BYOD), and cloud- based assets that are not located within an enterprise-owned network boundary. Zero trust focus on protecting resources (assets, services, workflows, network accounts, etc.), not network segments, as the network location is no longer seen as the prime component to the security posture of the resource.

Google pionerred it in the 2000s I believe, but its very normal now. A commom deployment will have an always on vpn agent on each device, which will then use mesh vpn tech like wireguard to do peer to peer connections between the client and server. There is no need for a central vpn controller. At most their is a dns-ish directory service that runs to let each agent queiry to get public keys for the other agents. Access is gated with RBAC and ACLs.

Tailscale is well known name that provodes this model. Netbird is a FOSS example.

[–] Creat@discuss.tchncs.de 2 points 3 days ago* (last edited 3 days ago)

That really depends on how the VPN is setup and configured on the company side. And possibly how the applications it their servers are configured as well. In our case, absolutely nothing breaks and it just works.

Can't use a vpn it shows location is from unexpected location and gets my passport reset. Its really annoying.

[–] THE_GR8_MIKE@lemmy.world 9 points 3 days ago* (last edited 3 days ago)

That's why I send passive aggressive messages about my company on my work computer. Hopefully they see me laughing at their incompetence and obvious nepotism.

We'll, uh, see how it works out.

[–] mrnobody@reddthat.com 4 points 2 days ago

Thank God my company is so antiquated they don't even know about half the tech that exists to spy on employees. Thankfully I'm also head of IT so imma keep them in the dark about that loll. Every time I upgrade the simplest things it's like I've shit out actual magic. It's great!