Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Going back to my original point in this thread, aren't you describing how the post-firing lockout is based on the company's mistrust of the employee rather than the other way around, right?

My point was never that there aren't security protocols that could be used, only that its not relevant whether the employee trusts the company in that scenario.



But it's the existence and application of these security protocols that can make all the difference, and having these protocols in place shows already some type of institutional maturity.

With the proper protocols in place, a company doing layoffs signals "we trust you can still perform your role as a developer, you can still communicate/collaborate with your colleagues and you can even access the source code (because who really is going to check if you are deleting the code repo from your machine?), and the removal of write-access to the systems can be seen as a smoke test if the transition can be done orderly", while the standard current procedure just says "Through no fault of your own, you will be seen now as a potential threat so we will treat you as toxic material".




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: