Intel IME can snitch on this kind of thing. Completely independent of the OS too.
520
I mean it likely isn’t an issue for org security (assuming they’re using bitlocker appropriately etc.)
Data loss/leak prevention would vehemently disagree. It's a potential exfiltration point, especially if the org is blocking USB writes.
Networking might have a thing or two to say about it as well, as it is essentially an untrusted setup on company networks
Sure, people should not use their work computer for personal use.
This isn't great. But what you're wanting to do will get you fired.
Danger Will Robinson! Do NOT fuck with company hardware!
You are going to potentially set off a shit ton of alarm bells, and risk your job, by even attempting this.
First of all, almost all such devices come with a BIOS lock. You'd need to get the password before you could even begin this (again, do not do it!)
Secondly, they'll be able to tell something is up from the foreign UEFI entries.
Thirdly, if that doesn't expose you, Intel IME will. Doesn't matter what operating system you're running.
And you're going to create some royal fucking headaches for a lot of people in your company.
Let's start with security. Remember when I said you'll set off alarm bells? Well, I mean some mother fucking alarm bells. Security will have a god damn aneurysm over this, and they will believe you may be doing this to bypass security, possibly for nefarious reasons. A foreign hard drive with its own OS looks shady as shit.
Then there's the regular tech people. You're going to cause various headaches for them too. Not least because under many service agreements, the company itself may not be authorised to open up the workstations themselves. Many workplaces rent their workstations nowadays, and it is not uncommon to see this language in their SLAs.
Then there's the fact that the OS image on the original drive potentially cannot be trusted any more, so they have to wipe the fucker clean and do a fresh image install.
TL;DR, You are giving your company several solid reasons to fire you for cause by doing this.
That's my point though. YouTube's audio quality is utter wank, so it's easier to source the music through the likes of Spotify and rip it for piracy. All you need to do at that point is tamper with the watermarking. If you're pulling the OGG Vorbis source files directly, and have access to two Premium accounts, you can rip it twice and diff it to see the areas that need to be modified
It is piracy if you make it available for others to download. Plus the concept of time shifting doesn't really apply to on-demand media.
Because YouTube isn't the biggest ripping source. That award goes to Spotify.
Spotify rippers are rife these days. I've even made my own.
Imagine what the developers of Rogue must feel. Games in that vein are still called Rogue-likes 43 years later
They didn't directly take BoTW's sound track and put it in. The most they did is use very similar concepts. Which is legal.
Pokémon doesn't own the concept of cute magical anime animals either. Infact I'm pretty sure it's a common anime trope.
If they could do shit about this, Digimon and Yokai Watch would not exist.
The security implication from a USB boot are probably more severe but also more the fault of the people configuring your work machine. It is expected that people will plug things like pen drives in, to a degree. It is your job to block it with configurations.
The real problem is that once you start adding or removing internal hardware, that configuration no longer stays a trusted one because they've meddled with the components.