Sounds like your network is doing something evil. Try it in TAILS.
Their company is attempting to hijack TLS connections to eavesdrop on their browsing.
It only works with websites that also offer a non-TLS version (which the hijacker uses to fetch content and then re-encrypts with their own certificate after they've snooped). But it doesn't work if the website doesn't have a non-TLS version and/or specifies it should only be used with TLS.
Another way for it to work is for the company to get their own certificates on the machine, which is very easy if it's a work-issued machine. But I'm guessing OP is not using a work machine.
Yeap, got it. Thanks a lot !
Your work is essentially doing a man in the middle on your traffic which is something you agreed to in your employment contract.
For security reasons companies will inspect user traffic for to make sure they are not accessing anything they shouldn't be.
This doesn't mean someone is actually looking at what you are doing, it just means that if something is trying to sneak in via a TLS session it will be picked up
Thanks !
You mean TLS certificate issues? Looks ok in Firefox here.
Ohh, thanks for that... I noticed when under the office's VPN, it doesn't work, :( Which is really bad to me, since it then block any services from it, :(
It seems like disroot doesn't like the office's cert when connected through VPN...
Thaks for replying !
Your office is inspecting the network traffic, and replacing the original certificate with its own certificate.
The problem is with your office firewall most likely :)
understood, thanks !
Yeap, thanks a lot !
Fediverse
A community dedicated to fediverse news and discussion.
Fediverse is a portmanteau of "federation" and "universe".
Getting started on Fediverse;
- What is the fediverse?
- Fediverse Platforms
- How to run your own community