this post was submitted on 07 Mar 2024
80 points (90.0% liked)

Privacy

31609 readers
99 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

I work on a corporate laptop that has an infamous root CA certicate installed, which allows the company to intercept all my browser traffic and perform a MITM attack.

Ideally, I'd like to use the company laptop to read my own mail, access my NAS in my time off.

I fear that even if I configure containers on that laptop to run alpine + wireguard client + firefox, the traffic would still be decrypted. If so, could you explain how the wireguard handshake could be tampered with?

What about Tor in a container? Would that work or is that pointless as well?

Huge kudos if you also take the time to explain your answer.

EDIT: A lot of you suggested I use a personal device for checking mails. I will do that. Thanks for your answers!

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 3 points 8 months ago (3 children)

Just run portable Firefox without the root cert?

[–] [email protected] 9 points 8 months ago* (last edited 7 months ago) (1 children)
[–] [email protected] 3 points 8 months ago (1 children)

It's good to know that they can't bypass wireguard or Tor. I was a worried about that.

As others have suggests, I will probably use a separate device to check my mail. That seems the safest and fairest option both from the company and my perspective.

[–] [email protected] 1 points 8 months ago

Protecting your traffic over the wire also doesn't stop them from getting the data directly from the OS or program itself.

It's their hardware, you're just allowed to use it (and according to papers you signed when hired, likely only for work use).

My company uses a similar MITM technique on all our network traffic, but we have also used a number of other tools that don't have the ability to snoop on the network traffic but can still get browsing data from user machines. Most browsers have "enterprise mode" features, or just store browsing history in a file that other programs can read.

We've also used systems that installed at the BIOS and/or bootloader level to allow us to track the location of and take certain remote actions on company hardware that was taken off the company network. If the device got an internet connection at all, it was still ours to control. Was very handy for people who tried to keep their laptop after they quit.

Technically they could use OCR on automatic screencaptures, which would bypass anything you could do. There's a ton of "management" software that does automatic screen captures, or allows someone to look at an overview of desktops like a security guard looking at a bank of camera monitors. Usually that's something schools use, but it is available for companies.

They could use a keylogger too.

The point is, you cannot control, or have any foolproof knowledge of, what they have installed on your work machine. That means that you cannot effectively work around or bypass it. If you absolutely need to, make a new "personal" email account to use for things like spotify or youtube on your work machine, and just use your damn phone for personal stuff.

[–] [email protected] 2 points 8 months ago

I tried opening a browser in a Docker container and but couldn't browse any site except google because it didn't recognize the CA authority.

[–] kylian0087 2 points 8 months ago

Often gets blocked. I tried on my work and you can't use any other browser.