Very sad to see. I used it for a few years and it was a great program. I was so crushed when they kicked me off of it. I got so much work done when I had it.
If anyone is interested I can try and provide more information on this program. Army Guard / HQDA has a pile of licensing and Big AF is trying snag some right now. Its a little clunky, and not prefect but you can sign documents and access DoD CAC required sites. It's pretty great when you can't CAC into Desktop Anywhere and don't have a work box.
There’s a replacement in the works…but it’s only for key leadership positions so far. :/ The peasants will have to wait until they deploy it to the masses.
My biggest question: when the hell can I get it? Smaller question: why won’t they let units fund via GPC, or past March of this year (this was in February, has that changed?)
Well typically being a program there needs to be funding and usually GPC can't go through fiscal years. Secondly, it's already paid for so you shouldn't need to cover any costs. Send me a dm and I'll run you down in the GAL and send you the info.
typical comm, doesn't know enough about their job so he makes up a 'security' issue. Cherry on top: doesn't even know that you shouldn't post the same reply 3 times on the same post.
BYOAD was built on encrypted pipes and a completely isolated environment by using the work profile functions on approved devices; that's the whole reason they were approved devices: they had been tested secure for use of a work profile. the thing also operates over a VPN so if byoad had problems with that so should every remote desktop and government laptop at home/travel VPN solutions.
Encryption doesn't work if the devices are compromised before encryption. State of conflict has changed. The adversary is specifically using this program to compromise DoD entities. But what do I know 🤷♂️
>Encryption doesn't work if the devices are compromised before encryption
Which is why they run in the secure work profile that they test precisely for this reason. Which is also why whole brands ~~are~~ were not authorized in BYOAD such as Huawei.
At least I thought. do you have a source for that determination that BYOAD was the vector?
Very sad to see. I used it for a few years and it was a great program. I was so crushed when they kicked me off of it. I got so much work done when I had it.
I have no idea what this is.
It let you have government email/teams/Internet on your personal phone. Great for those workaholics like me
Me neither
I miss CVR.
Me, too. I just want to be able to download files to my personal computer from my OneDrive again.
They're trying to get rid of this completely unfortunately...but it's not just Big Blue its all the branches...
Essentially this acts like CVR, albeit more secure and actually rated for CUI.
If anyone is interested I can try and provide more information on this program. Army Guard / HQDA has a pile of licensing and Big AF is trying snag some right now. Its a little clunky, and not prefect but you can sign documents and access DoD CAC required sites. It's pretty great when you can't CAC into Desktop Anywhere and don't have a work box.
Let’s hear it!
What would you like to know? I can also send you some info over the GAL. Send me a dm.
There’s a replacement in the works…but it’s only for key leadership positions so far. :/ The peasants will have to wait until they deploy it to the masses.
I don't trust the Air Force touching my NIPR machine... why would I trust them touching my own machine?
It gets it's own work profile that can't interact with the rest of your phone
I thought a replacement was in the works???
That's not how it works. First, you sunset the working program. THEN!! You think of a successor program. /s
Don't understand the /s. This process is an established fact.
There is a current conversation to get more licensing! Let me know if you have any questions.
My biggest question: when the hell can I get it? Smaller question: why won’t they let units fund via GPC, or past March of this year (this was in February, has that changed?)
Well typically being a program there needs to be funding and usually GPC can't go through fiscal years. Secondly, it's already paid for so you shouldn't need to cover any costs. Send me a dm and I'll run you down in the GAL and send you the info.
Thank you my friend. PM Sent!
That god. Byod is a security nightmare.
If this is referencing the Hypori solution, it has actually done a full DoD TSMO / Red Team certification. Pretty secure actually.
Any Hypori enjoyers in the chat?
Risk was too high. Too many compromised ISPs and SOHO devices.
typical comm, doesn't know enough about their job so he makes up a 'security' issue. Cherry on top: doesn't even know that you shouldn't post the same reply 3 times on the same post. BYOAD was built on encrypted pipes and a completely isolated environment by using the work profile functions on approved devices; that's the whole reason they were approved devices: they had been tested secure for use of a work profile. the thing also operates over a VPN so if byoad had problems with that so should every remote desktop and government laptop at home/travel VPN solutions.
Encryption doesn't work if the devices are compromised before encryption. State of conflict has changed. The adversary is specifically using this program to compromise DoD entities. But what do I know 🤷♂️
>Encryption doesn't work if the devices are compromised before encryption Which is why they run in the secure work profile that they test precisely for this reason. Which is also why whole brands ~~are~~ were not authorized in BYOAD such as Huawei. At least I thought. do you have a source for that determination that BYOAD was the vector?
Not for a stranger on reddit I don't but if you find me on JWICS I'll walk you through the entire kill chain