Yeah, I once worked at a company that had random monitoring, but I’d just pull up task manager, find the associated line item, then hide everything but the processor numbers in a small part of the screen. Whenever that started to move I knew they were recording, and I’d click on another icon like Notes to cover up that number that showed they were recording, wait a while, then uncover the little number again so it could warn me when it was “randomly” recording again. I never got recorded/monitored without knowing it, and then I knew they wouldn’t “monitor” again for at least a certain range of time.
I also interviewed with a company that made everyone lock up their phones in a personal locker, then had a guard scan (metal detector) everyone in and out of the entrance/exit. It was ridiculous…but it was more realistic than trying to “jam” phones, because a person could still have their phone, take a picture, or type anything they want into it, and then as soon as they leave the building, they’d still have access to all the data, so Jamming is even more completely ridiculous.
Besides, even if the computer is being monitored randomly, a person can mostly prevent knowledge of what they are doing simply by spacing out the steps so an individual step isn’t suspicious or able to be identified in and of itself, but if seen altogether in the same time instance, it would be obvious. In the screenshot example, a malefactor could take a screenshot (which can be done without visual cues or evidence so that shouldn’t tip them off anyway), wait several minutes, save or change the file name to something that seems harmless or normal (definitely change the file extension), wait several minutes or days, encrypt it into something else like a .zip or whatever, and remove the file extension there too, pretend it is a different file that just got corrupted or crashed and istn’t responding anymore. Send it through some encrypted email or countless other options that they can never intercept or view because of end to end encryption. And a lot of stuff doesn’t have to be as complicated as a screenshot. If someone is trying to steal customers’ credit cards or something, they can send a seemingly innocent email occasionally using a Cypher that seems totally innocent or includes part of the numbers at a time. Maybe email themselves something that seems to be a reminder or something they want and are approved to work on at home, or to study up on some kind of topic related to work, but really it is stealing little pieces at a time. Then delete everything later. There are so many ways to get out any kind of data that an employee wants regardless of the supposed protections. Even top secret stuff is leaked regularly and it uses some of the most stringent security protocols. I’m not necessarily saying places shouldn’t take any precautions, but most of the ones that do so are simply more annoying than they are secure.
Companies could try to implement a “white list” method where only specific things are allowed to be accessed on the network/internet, and nothing else, and if that is the case, then the Wyze browser wouldn’t work at those places anyway. Basically anywhere that implements security to ban phones but would allow access on the computer to go anywhere on the internet is seriously wasting their time IMO, and just making their employees hate work more than they are being “secure.” They aren’t truly preventing the “bad guys” from doing anything, but they are annoying all the people who weren’t going to do anything bad anyway.
Since we are talking about places where the Wyze browser would work, we must logically conclude the employers are really paranoid and aren’t the ones who are banning phones for security, or strictly monitoring the screens, etc. It is simply that people are allowed to access the stuff, and instead of wasting their phone battery and phone life and only having access to 4 cams on the screen at a time, people simply want the convenience of being able to monitor cams on a corner of their computer monitor while they work on other stuff and feel relief at not worrying what’s going on, or the comfort of seeing their family while they are working or whatever. In some ways it’s not much different than someone having a picture of their family as their desktop or whatever (except that it’s using bandwidth). So I think most of the security situations and discussion are irrelevant to most people who want this for while they work.