@josh @keithp @mjg59 What kind of users one has is incredibly important, IMO.
One can impose a vast array of restrictions on non-technical employees without significantly interfering with their productivity. Developers, however, cannot do their job without privileged access to their development environments. Applying policies meant for non-technical users to developers is a recipe for disaster.
In my experience, the only reasonable solution is to isolate sensitive data (such as customer data and signing keys) and integrity-critical data (such as source code) from dangerous workloads (such as email and web browsing) via virtualization. The security boundary becomes the entire VM, not the unsecurable workload running within it. Qubes OS makes this much easier.
@mjg59 it's a hard trade-off between cost and developer efficiency
I get the need to restrict developer (or any user) choice, but also really get the need for "the tools I work with fast", the frustration from not being able to use them
It's hard
Had such a discussion with our CEO some weeks ago, but we didn't find a way to easily resolve this
@littlefox @mjg59 Efficiency is, usually, the employer's concern. If my employer is happy to pay me for 10 hours of business-value-delivering work and 30 hours of fighting with OS config, why should I be unhappy to accept?
(If it gets in the way of personal growth and future career prospects, then sure. But very many things can get in the way of that too.)
@valpackett @mjg59
That line of reasoning sounds close to "Don't build safety systems into cars or the driving environment; let each driver handle their own safety."
We have centralized safety and security concerns in many domains because we did let people handle it themselves at some point, resulting in disasters.
@mjg59 Sure.
And then there are the special cases. Due to something like that, I recently told my employer that I won’t be able to do the work he gives me any longer. That is going to be fun and pissed customer.
@mjg59 No problem, I'll just work somewhere else. (I'm not kidding, it's why I fired my last employer)
Security always say they don't want to be the guys that always say no, ...and then they do. (Really, how about PR review that just screens for the most egregious? Raising the bar to some modest subtlety seems quite cost effective)
If my choice of OS in any way risks customer data, it's already long past time to run for the hills, because security fell down on the job a long, long time ago.