• stoy@lemmy.zip
    link
    fedilink
    English
    arrow-up
    6
    ·
    2 days ago

    There is nothing to prevent MS from sending the keys from every intune instance.

    • wizardbeard@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      4
      ·
      2 days ago

      You don’t have to store them in intune, as far as I know. I’m not a desktop engineer, but I know at my workplace they historically are stored in AD.

      • SpikesOtherDog@ani.social
        link
        fedilink
        English
        arrow-up
        3
        ·
        2 days ago

        Here it depends. Is AD in Azure? This privacy statement seems to indicate that Microsoft has full access to your data and that it’s just company policy that keeps them out.

        If your servers are on site and firewalled, then Microsoft would need some sort of remote access tool that tracks each server. This means that on-site licensing and patching needs to be done. I can’t think of any other service off the top of my head, but I’m only a desktop engineer.

    • phil@lymme.dynv6.net
      link
      fedilink
      arrow-up
      1
      ·
      2 days ago

      No such issue with end-to-end encryption, as only the end user devices have the keys. It’s used by Apple (that was the main argument in the FBI wanting to unlock iPhones), some messaging services like Signal and Whatsapp, only mentioning big tech. Of course, you have to trust them when it’s closed source. Here the story is that Microslop chose from the beginning centralized keys that they own and can share. It’ s all well known, but the news is that they really did it.