If you read the whole thread that you replied to, instead of just the
introductory message, you'd have seen several answers to those questions,
but to summarize...

Anything you do while on the employers network (not since, but while you
were there) is subject to monitoring by them.  Period.  Since it is HTTPS,
they would only see that you were accessing it, but not exactly what you
were doing... EXCEPT...

Fuzzy Logic pointed out that it would take a man-in-the-middle attack to
decrypt the connection, which "your browser would warn you about", but
that's not entirely true.  SSL Interceptors, which many companies now use,
can do such an attack, and if they just re-signed the connection, and used
a certificate that your computer trusts (and since they own the computer,
they designate the trust), your browser would NOT warn you.  You could see
that they're signing it by looking at the certificate, but most people
don't bother to read the certificates, and just look for the pretty green
lock; which you still see.

Bottom line, don't do anything on your company's network/hardware that you
don't want them to know about.

On Sun, May 3, 2015 at 10:25 PM, Anonomousse <[email protected]> wrote:

> Im curious about the same thing...
> just departed from a company that has an interest in me even after
> departure
>
> On Friday, November 4, 2005 at 7:49:27 AM UTC-4, funnywan wrote:
>>
>> Is it technically possible/feasable to intercept Gmails even when
>> running your session under HTTPS?
>>
>> The reason I ask is that there have been rumours at my company (small
>> company BTW) that management have the capability (if they wanted to do
>> it) to intercept/read our Gmails.
>>
>> Never mind that this would be a total invasion of privacy but we have
>> all been debating at work whether this is possible or not, etc. so i
>> thought i would try to settle it once and for all - with your help of
>> course.
>>
>> So...
>>
>> 1) Is this even possible?
>>
>> 2) If it is, how easy/difficult would it be to do (i.e. would it
>> require major resources and infrastructure, etc.) ?
>>
>> 3) What would the technical limitations of this be?
>>
>> e.g. Would they need packet sniffers? Would they need tons of hard
>> drive space to store all internet traffic etc.? Would someone have to
>> physically be intercepting the traffic in real-time as it is being
>> sent/received?
>>
>> Please help to finalise the Gmail interception debate - you will
>> receive nothing for your input but hey, at least it's friday today.
>>
>> Thanks.
>>
>>  --
> You received this message because you are subscribed to the Google Groups
> "Gmail-Users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to [email protected].
> To post to this group, send email to [email protected].
> Visit this group at http://groups.google.com/group/gmail-users.
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"Gmail-Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at http://groups.google.com/group/gmail-users.
For more options, visit https://groups.google.com/d/optout.

Reply via email to