I work on a corporate laptop that has an infamous root CA certicate installed, which allows the company to intercept all my browser traffic and perform a MITM attack.

Ideally, I’d like to use the company laptop to read my own mail, access my NAS in my time off.

I fear that even if I configure containers on that laptop to run alpine + wireguard client + firefox, the traffic would still be decrypted. If so, could you explain how the wireguard handshake could be tampered with?

What about Tor in a container? Would that work or is that pointless as well?

Huge kudos if you also take the time to explain your answer.

EDIT: A lot of you suggested I use a personal device for checking mails. I will do that. Thanks for your answers!

  • catloaf@lemm.ee
    link
    fedilink
    English
    arrow-up
    56
    arrow-down
    1
    ·
    9 months ago

    Don’t. Just fucking don’t. Keep your personal stuff off your work equipment and vice versa. I don’t know why people keep wanting to do this, because it only leads to trouble.

    • BearOfaTime@lemm.ee
      link
      fedilink
      arrow-up
      21
      arrow-down
      2
      ·
      9 months ago

      Adding on:

      Anything you do with a company device brings liability to them, which is part of why you should keep things separate, and part of why they manage devices.

  • SkyNTP@lemmy.ml
    link
    fedilink
    arrow-up
    23
    ·
    edit-2
    9 months ago

    You wouldn’t do this with a stranger’s device, so why insist you do it with your employer’s device? Just don’t.

    If you have a workstation and want to use the same monitors/headsets/peripherals with both the company device and your personal device try one or two KVM switches.

  • kylian0087@lemmy.world
    link
    fedilink
    arrow-up
    2
    ·
    9 months ago

    What I did is use a ssh tunnel and rdp over that. ssh and RDP are both build in to windows. VPNs often don’t work because some software needs to be installed.

  • MTK@lemmy.world
    link
    fedilink
    arrow-up
    1
    ·
    9 months ago

    The computer probably has local security tools (such as an edr) that spy on you any way.

    You need to assume it is completely compromised.

    But… assuming this isn’t in violation of your company computer usage policy (which it very much might be and can put you in trouble) you can install any VPN (avoid spyware shit) and a different browser (ideally something a bit obscure, like librewolf) and this will bypass the MiTM as the the device that does the MiTM would be either:

    A) a network device that hijacks the HTTPS requests (VPN bypass this)

    B) the browser used by the company

    C) some other kind of software that atteches itself to all browsers via admin installed extensions (obscure browser might not be recognised by such software, be sure to check the installed extensions after letting the browser run for an hour)

    And once you are done you can check the certificate chain in the browser to confirm.

    • SnotBubble@lemmy.mlOP
      link
      fedilink
      arrow-up
      1
      ·
      9 months ago

      Before I wrote this thread, I ran for a couple of minutes a browser from a docker container. I couldn’t browse any website because of the missing CompanyName CA certificate. So, I stopped because it was too freaky.

      • MTK@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        9 months ago

        That makes sense, the MiTM was still going on but you browser was not configures with the company CA

  • x4740N@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    1
    ·
    9 months ago

    Don’t use the company laptop, you can only confirm what is going on with your own devices

  • Rambomst@lemmy.world
    link
    fedilink
    arrow-up
    1
    arrow-down
    1
    ·
    9 months ago

    Use your company laptop for only work…

    If you install non-approved software you will probably get flagged by the security team.