I work on a corporate laptop that has an infamous root CA certicate installed, which allows the company to intercept all my browser traffic and perform a MITM attack.
Ideally, I’d like to use the company laptop to read my own mail, access my NAS in my time off.
I fear that even if I configure containers on that laptop to run alpine + wireguard client + firefox, the traffic would still be decrypted. If so, could you explain how the wireguard handshake could be tampered with?
What about Tor in a container? Would that work or is that pointless as well?
Huge kudos if you also take the time to explain your answer.
EDIT: A lot of you suggested I use a personal device for checking mails. I will do that. Thanks for your answers!
Don’t. Just fucking don’t. Keep your personal stuff off your work equipment and vice versa. I don’t know why people keep wanting to do this, because it only leads to trouble.
Adding on:
Anything you do with a company device brings liability to them, which is part of why you should keep things separate, and part of why they manage devices.
Personal stuff on personal devices.
Company stuff on company devices.
Never mix. I don’t even check my personal email on my work laptop.
If I need access to my home, it’s through an external connection like LTE.
The best thing is to use a different device, period.
Since the company is lord and master over the device, in theory, they can see anything you’re doing.
Maybe not decrypting wireguard traffic in practice, but still see that you’re doing non-official things on the device that are probably not allowed. They might think you’re a whistleblower or a corporate spy or something.I have no idea where you work, but if they install a CA they’re probably have some kind of monitoring to see what programs are installed/running.
If the company CA is all you’re worried about, running a browser that uses its own CA list should be enough.
deleted by creator
Just run portable Firefox without the root cert?
.