Hello, The IT department does not have access to my machine. Also, I have no option but to keep the cert because if I don’t the filter may use DPI to block TLS for me. Not sure if that will be happening, but it may be possible. When it comes to malware, if I think that the IT department is going after me, I will use Tails. That should certainly stop them.
> On Nov 20, 2015, at 4:33 PM, Ivan Markin <t...@riseup.net> wrote: > > Justin Davis: >> Just to give more information, the >> attack will be done by having every network user install a root cert >> in our browsers. > > Be twice (or more) careful if someone have access to your computer in > such way. They can even dump _anything_ that you're looking via Tor. For > instance, they can sniff SOCKS5 TBB<->tor connection. > > In other case just delete malicious CA certs (if you have these > permissions). > -- > Ivan Markin > > -- > tor-talk mailing list - tor-talk@lists.torproject.org > To unsubscribe or change other settings go to > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk