I work on a corporate laptop that has an infamous root CA certicate installed, which allows the company to intercept all my browser traffic and perform a MITM attack.

Ideally, I’d like to use the company laptop to read my own mail, access my NAS in my time off.

I fear that even if I configure containers on that laptop to run alpine + wireguard client + firefox, the traffic would still be decrypted. If so, could you explain how the wireguard handshake could be tampered with?

What about Tor in a container? Would that work or is that pointless as well?

Huge kudos if you also take the time to explain your answer.

EDIT: A lot of you suggested I use a personal device for checking mails. I will do that. Thanks for your answers!

  • KairuByte@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    0
    ·
    4 months ago

    I’m curious on how your systems would handle something like a guacamole instance running on a users home network? It’s pure http traffic afaict, but I’ve always been curious how it would be logged.

    • WanderingCat@lemm.ee
      link
      fedilink
      arrow-up
      0
      ·
      4 months ago

      Depending on the set up, but there should be something that logs all network connections. So they can see the connection to the private IP, just can’t see what it was