A month has passed

Your go-to forum for bot dataset expertise.
Post Reply
rakhirhif8963
Posts: 535
Joined: Mon Dec 23, 2024 3:13 am

A month has passed

Post by rakhirhif8963 »

- Wait, boss! Who's stopping us from intercepting the conversation directly from the microphone and speaker?

- Nobody! That's right, Rita! That's a good solution, especially since we only have two operating systems. First, we need to write an interceptor for a cheaper OS and think about how to install it, and then we'll think about a more complex one.

- Boss, how will we install this software on the required smartphones?

- The same as unnecessary ones. You need to make a toy, then some other "necessary" software.

It is interesting to note that when trying to "take away" data from enterprise information systems, the most common (68% of cases) use is good old USB drives. Next come mail (14%) and clouds (13%). Messengers and printers (2% each) are far behind them.

Irrational use of working time
In the above-mentioned study, cases of chile whatsapp data use of work time accounted for the largest number of recorded information security incidents (34%). “Social networks, web surfing and shopping are the main ‘killers’ of work time. Those who waste time on social networks spend 1 to 3 hours there. Reading the news takes another 1 to 2 hours, shopping takes an average of 2 hours a day,” the authors of the report note. Head of the Analytics Department at SearchInform Alexey Parfentyev adds: “The real scale of discipline problems may be completely unnoticeable. In almost 100% of cases of irrational use of work time, the employee was at the computer and spent a significant part of the day on social networks, on entertainment resources or doing their own thing. This type of incident is characterized by a systematic nature. If an employee is distracted by entertainment, he does it constantly.”


— Boss, we have made various software. There are first results. Everything worked out. According to the agreement with antivirus companies, our service software is not detected by their products. So everything is good on this side too.

- Well done! What do you suggest we use?

— Us? Hardware encryptors. Looks like a regular phone. Works in tandem with any smartphone. At the same time, it jams all microphones within a radius of 5-7 m. And prohibit military personnel from using all smartphones. Only old push-button phones that do not have an operating system.

Do you think these are fairy tales? Not at all! Hardware encoders have been used for quite a long time. And no one has cancelled them!
Post Reply