So you're saying this is the outline of a square in the astral plane? Because it sounds like you're saying this is a square in the astral plane.
hansolo
Hey, I failed the highest level of calculus possible. Twice.
....and a square has four interior 90 degree angles.
...and based on the infinite number of sides for a curved line aspect, the "90 degree" angles would all be +/- the limit as it approaches zero, so never truly 90 degrees but always an infinite fraction away.
In 1282 AD, an accord followed the disaster later recounted as the Pied Piper of Hamelin myth, in which a warg working with the demonic entity we now call the "Tooth Fairy" walked 200 children off a cliff simply to collect their fresh teeth to fuel their evil orgies. Duke Albert II of Saxony hired a shaman and witch to force a détant with the demon as a response. After some haggling, which cost one advisor his jaw, the demon agreed to effectively scavenge from the local townspeople in the night in exchange for a ceremonial pittance, often a handful of grain or a piece of fruit.
The demon, now overwhelmed by the sheer volume of teeth lost on a daily basis by 7.5 billion people, is doing great 750 years later, playing the long game to success.
Even under the GDPR, an employer can monitor you camera, mic, and keystrokes of they really want on a work device.
Seriously, no one is entitled to unlimited personal use, and explicit trust, of a work device. It's a work-owned device, it's not your shit! This isn't hard. They give you the same "click/sign here" for a use policy that any social media site gives you (900 pages shorter). No one should be upset by this unless they are already behind the curve in general, or are pushing fake outrage.
I can't help you other than to say MSI is awesome. I wish you luck on your quest.
Also taking gas station pills full of burdock root because you think you might have a drug test.
Pell Grants helped me get a degree that increased my income, made my life better, and made me a better, taxpaying American.
-Actual client testimonial.
Like, today?
It's a bold strategy Cotton, let's see if it pays off.
I don't mean compromised, I mean your IT manager has an acceptable use policy, which all staff agree to in writing, and the IT folks have to pass audits that say they can assure management they know what happens in the company network.
I agree that keyloggers are dystopian, and honestly overkill unless you are paranoid about proprietary data. But you should follow the same philosophy as your network architecture: Zero Trust.
When you're at work and using work devices, you have no reasonable expectation of privacy. Just because you take the laptop home doesn't make it suddenly your personal device. It makes it a liability to you.
Never ever log in to a personal account for anything at work, because you shouldn't trust your work with your privacy. If you do, you should just know you need to immediately change your password because it's now on a cleartext log file somewhere where many humans can read it. Consider it compromised.
F. This will be moved to an OSINT tool within a week, and scraped into a darkweb database by next Friday.