Friday Apr 11, 2025

How your employer sniffs you, or Deep Packet Inspection.

👂 Can an employer snoop on their employees' network traffic and how? Does encryption protect against such voyeurism? Is it even legal? I will do my best to answer these questions. Let’s go! Sources: ❓What is a router? https://www.cloudflare.com/en-gb/learning/network-layer/what-is-a-router/ 🛜 My home network: Ubiquiti UniFi gear, fiber gigabit Internet, CAT6 and CAT3 wiring https://jeffwilcox.blog/2018/04/seattle-network/ 🔐 Data Loss Prevention (DLP) https://www.imperva.com/learn/data-security/data-loss-prevention-dlp/ 🇬🇧 The UK's data protection legislation https://www.gov.uk/data-protection 📟 Electronic Communications Privacy Act of 1986 (ECPA) https://bja.ojp.gov/program/it/privacy-civil-liberties/authorities/statutes/1285#0-0 💉BSNL is injecting code on to your browsers, and here's what it does. #SaveTheInternet https://internetfreedom.in/taking-a-closer-look-at-bsnls-code-injections-savetheinternet-2/ 🤔 What is Deep Packet Inspection? How it Works and Why It Is Important https://www.endpointprotector.com/blog/what-is-deep-packet-inspection-how-it-works-and-why-it-is-important/ 🔍 Deep inspection https://docs.fortinet.com/document/fortigate/6.2.0/cookbook/122078/deep-inspection 🇪🇬 Egypt launches deep-packet inspection system https://www.theverge.com/2014/9/17/6350191/egypt-launches-deep-packet-inspection-with-help-from-an-american 📩 Regex validation of email addresses according to RFC5321/RFC5322 https://stackoverflow.com/questions/13992403/regex-validation-of-email-addresses-according-to-rfc5321-rfc5322 📑 unknown scripts are running and redirecting on click to unknown websties https://stackoverflow.com/questions/51064933/unknown-scripts-are-running-and-redirecting-on-click-to-unknown-websties 🖥️ Technical Tip: Blocking and monitoring Tor traffic https://community.fortinet.com/t5/FortiGate/Technical-Tip-Blocking-and-monitoring-Tor-traffic/ta-p/196239 📊 Analyzing Tor traffic through Deep Packet Inspection? https://security.stackexchange.com/questions/237082/analyzing-tor-traffic-through-deep-packet-inspection Relevant xkcd: https://xkcd.com/208/ © All trademarks, logos and brand names are the property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, trademarks and brands does not imply endorsement. My socials: Instagram @mattchrobok https://www.instagram.com/mattchrobok/ Twixxer @ChrobokMatt https://twitter.com/ChrobokMatt Mastodon https://infosec.exchange/@mateuszchrobok LinkedIn @mateuszchrobok https://www.linkedin.com/in/mateuszchrobok/ TikTok @mattchrobok Facebook https://www.facebook.com/mattchrobok Chapters: 00:00 Intro 00:21 The Rrrole of Rrrrouters 02:19 Insides 04:01 Work 06:56 Leak 08:35 Lawfulness 12:20 More? 15:02 What To Do And How To Live? #data #leak #Surveillance #networking #work

Comments (0)

To leave or reply to comments, please download free Podbean or

No Comments

Copyright 2025 All rights reserved.

Podcast Powered By Podbean

Version: 20241125