Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

For example, downloading a list of prohibited domains to your device and running a local firewall. “Monitoring” in this context implies that someone will be able to later review the websites you’ve visited or tried to visit.


Every enterprises local firewall I know of can report back to a central system for logging.


I don’t have any special knowledge of enterprise firewalls; parent just asked how it was possible.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: