this post was submitted on 30 Jan 2026
228 points (98.7% liked)
Technology
80635 readers
3059 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
While making this easier to access isn't a positive, there are a ton of ways that this can, and already is, being done at companies that actually care about this shit.
Yeah you're totally in the office, but your laptop just magically has an IP from the subnet for devices connected over VPN ๐
Once again I must insist that people need to stop expecting any privacy on work devices. It is possible to find out anything on them, including location, it's just a matter of how much effort your workplace is willing to expend on looking.
Edit: While I appreciate the article being short and to the point, a link to any documentation on this would have been nice. The claim is that it will display the SSID of the Wi-Fi AP you're connected to. While being able to get that from your phone is a new bit of reach, it's possible to gather that from work devices easily.
just use vpn all the time, even when at your desk in the office
This will break a lot of applications.
This is literally how our corporate network is setup. You MUST be on vpn or you cant get to anything. Makes the access permissions super simple. Prior to this setup there were authorization settings that differed between on-prem/off, on vpn or off, which office you were in, etc. now they just deny all unless you vpn in and then it uses your vpn account to validate access there, in one place. Saved a lot of headaches.
That is certainly a direction. I hope you have robust redunacies on the concentrator.
The above is just modern network security. The model is called zero trust.
Google pionerred it in the 2000s I believe, but its very normal now. A commom deployment will have an always on vpn agent on each device, which will then use mesh vpn tech like wireguard to do peer to peer connections between the client and server. There is no need for a central vpn controller. At most their is a dns-ish directory service that runs to let each agent queiry to get public keys for the other agents. Access is gated with RBAC and ACLs.
Tailscale is well known name that provodes this model. Netbird is a FOSS example.
That really depends on how the VPN is setup and configured on the company side. And possibly how the applications it their servers are configured as well. In our case, absolutely nothing breaks and it just works.