• Eheran@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    24 days ago

    So you did not notice that they didn’t actual do anything…? But were happy that their mouse was moving around…?

    This is what I fail to get. You give people things to work on. Why do you want to spy on them instead of just looking at the results? Even if someone spends half the time watching YouTube, if all the work is done… who cares?

    • Cornelius_Wangenheim@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      edit-2
      23 days ago

      I’ve been the one identifying the people who use jigglers. Usually it was a manager coming to us to look for a reason to fire a poor employee or a contractor trying to bill a suspiciously large number of hours for the work produced. If it was just poor performance, HR would make us do a PIP and waste 3 months on them. Violating security procedures and falsifying time sheets was an immediate termination. And for the contractors, you need evidence in order to refuse payment.

      Btw, if you want to get away with it, don’t use a software or USB one. Get one that interfaces with a regular mouse. Modern cybersecurity software logs every process executed and device connected.

      • TheEighthDoctor@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        arrow-down
        1
        ·
        23 days ago

        But the USB one is going to be identified as a mouse (input device), you can even change the hardware id to be the same as the work mouse no?

        • Cornelius_Wangenheim@lemmy.world
          link
          fedilink
          English
          arrow-up
          0
          ·
          23 days ago

          USB devices have a hard coded vendor identifier and product identifier built into them that are issued from a central authority. The ones I saw were easily identifiable as not legitimate mice.