I work on a corporate laptop that has an infamous root CA certicate installed, which allows the company to intercept all my browser traffic and perform a MITM attack.

Ideally, I’d like to use the company laptop to read my own mail, access my NAS in my time off.

I fear that even if I configure containers on that laptop to run alpine + wireguard client + firefox, the traffic would still be decrypted. If so, could you explain how the wireguard handshake could be tampered with?

What about Tor in a container? Would that work or is that pointless as well?

Huge kudos if you also take the time to explain your answer.

EDIT: A lot of you suggested I use a personal device for checking mails. I will do that. Thanks for your answers!

  • Possibly linux
    link
    fedilink
    English
    arrow-up
    5
    ·
    9 months ago

    Do not do this if it let’s you. Its a good way to get in trouble

    • ddh@lemmy.sdf.org
      link
      fedilink
      English
      arrow-up
      2
      ·
      9 months ago

      I’ve done this in the past without apparent issue. Could you perhaps expand on where the risks arise here? My impression was that unless there is some independent hardware running code separate from the OS, then it would be OK?

        • ddh@lemmy.sdf.org
          link
          fedilink
          English
          arrow-up
          1
          ·
          9 months ago

          Let’s assume it’s allowed. Obviously it’s untrusted hardware, but for widely issued corporate PCs, what’s the risk that there would be some hardware snooping going on if you controlled the OS?

          • Possibly linux
            link
            fedilink
            English
            arrow-up
            1
            ·
            9 months ago

            The “snooping” is called a good security policy. Security should always come first.