Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I think the EU would have something to say about that: https://www.telegraph.co.uk/news/2017/09/05/landmark-eu-ruli...


Seems a little different. Courts ruled that work emails could be viewed, just not personal accounts used on work computers.


Additionally, unless your work environment is sophisticated enough to fiddle with the certificates on your machine, and run a MITM proxy, you should be safe using something like GMail over https. Now I'm sure some companies do manage to intercept outgoing https traffic, but I doubt that most companies do.

OTOH, I still think being paranoid is the safest policy, so if you're plotting to overthrow your boss, or sell secrets to your biggest competitor, I still wouldn't do it on the company networking, and/or using a company computer.


If your Gmail account is through work (i.e. not a personal one) they already have access to it.


Agreed. I was referring to the parent post's comment about using personal accounts at work. That might be safe, to some extent. But again, I would lean on the side of paranoia if you're talking about anything that could get you (fired|put in jail).


In any case, if you would plan any of that, I would guess that it would most probably leak out through entirely nontechnological channel - e.g. by somebody overhearing in person, or even by a co-conspirator defecting for their own gain.

Cloak-and-dagger games are very similar to building your own crypto: likely to be broken at a fundamental level, never mind the amount of magic security glitter that you pile on top.


Yeah, they said it here[1], and basically, given cause and given notice, they can still access private communications on work property. So not exactly what you are implying.

From the actual source: https://www.echr.coe.int/Documents/Press_Q_A_Barbulescu_ENG....


Thanks for the document. I think it still says that the employer should notify the employee beforehand of any potential monitoring of communications, which is different from assuming that every byte is being monitored.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: