Hacker News new | past | comments | ask | show | jobs | submit login

Absolutely not. The owners of IT systems need to be able to assert control over what enters and leaves the system.

Allowing uninspected outbound traffic makes it trivial for an attacker to exfiltrate data, an employee to accidentally or purposely release data, etc.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: