I work on a corporate laptop that has an infamous root CA certicate installed, which allows the company to intercept all my browser traffic and perform a MITM attack.

Ideally, I’d like to use the company laptop to read my own mail, access my NAS in my time off.

I fear that even if I configure containers on that laptop to run alpine + wireguard client + firefox, the traffic would still be decrypted. If so, could you explain how the wireguard handshake could be tampered with?

What about Tor in a container? Would that work or is that pointless as well?

Huge kudos if you also take the time to explain your answer.

EDIT: A lot of you suggested I use a personal device for checking mails. I will do that. Thanks for your answers!

  • NoneYa
    arrow-up
    68
    arrow-down
    0
    ·
    7 months ago
    edit-2
    2 months ago
    link
    fedilink

    deleted by creator

    • SnotBubbleOP
      arrow-up
      19
      arrow-down
      0
      ·
      7 months ago
      link
      fedilink

      Thank you for sharing this info. It’s very convincing and well argumented.

      I won’t try anything else and will use my personal device.

    • KairuByte
      arrow-up
      1
      arrow-down
      0
      ·
      7 months ago
      link
      fedilink

      I’m curious on how your systems would handle something like a guacamole instance running on a users home network? It’s pure http traffic afaict, but I’ve always been curious how it would be logged.