I'll say it again. Don't get a Mac. For <1 hr/day, the expense of it is not worth it. That would be like getting a Ferrari to go to the grocery store once a week. Get an elcheapo PC, use a good AV package and a VPN for your banking and be happier.With the Mac I'll run only personal things, that is, basics like banking etc, that's why in the last thread I was concerned about the budget, because I'd literally use that machine for few tasks, maybe less than 1h a day...
That depends... If you take the Ferrari once a week, preferably weekday to the grocery store, that would be a OK...I'll say it again. Don't get a Mac. For <1 hr/day, the expense of it is not worth it. That would be like getting a Ferrari to go to the grocery store once a week. Get an elcheapo PC, use a good AV package and a VPN for your banking and be happier.
That depends... If you take the Ferrari once a week, preferably weekday to the grocery store, that would be a OK...![]()
Unless the VPN is directly to the financial institution, the VPN doesn't really provide you an extra layer of security. Theoretically, the VPN gateway could terminate your SSL/TLS tunnel to the bank and intercept your connection to the bank. Back in my corporate days, we had Blue Coat proxy servers, that did that routinely for monitoring the SSL/TLS traffic. We had to make an exception for financial institutions for preventing the sessions to banks from being recorded in the logs in plain text.
That's how we monitored SSL/TLS connections to forums, social networks, etc., and quite of few people got "dinged" for abusive behavior on the web. While we did warned the employees that it is coming, they didn't take it seriously until couple of them got dinged...
Monitoring internet access is quite easy, but are you telling me that certain companies were faking the SSL handshake??? It's risky, illegal and not so easy to do with recent protocols.The authentication to the proxy server was seamless, the group assignment defined the access level to web.
As for VPN... Any corporation that allows in/outbound VPN connection from the end-users sub-nets, they deserve what they get. All end-user systems had received the proxy servers SSL cert, generated locally on the proxy server, for seamlessly terminate the destination's SSL tunnel at the internal proxy interface and re-established on the outside interface with the destination's SSL cert. It's slick and certainly nothing stopping a VPN tunnel to do the same, after the VPN tunnel is terminated.
Most of these companies run their own DNS server, and/or DNS caching server as well for further monitoring internet traffic.
Back in my consulting days, I used to carry an older wireless router with me; connected the WAN interface to the hotel's wired network and used my own wireless network. Fringe benefit, more than one person could access the internet simultaneously with a single daily charge for the web access. You know, back in the days when hotels used to charge for internet access. I haven't been traveling much for years, so I don't know what hotels do nowadays.
Let's call a spade a spade...Monitoring internet access is quite easy, but are you telling me that certain companies were faking the SSL handshake??? It's risky, illegal and not so easy to do with recent protocols.
The browser fingerprint could be difficult to replicate too...
I think I understand you, but this is an old way to run the business. Nowadays, every corporate laptop is used to access personal data from employees, like banks, facebook, health insurance etc...Let's call a spade a spade...
Proxy servers basically utilize an MITM attack, most, if not all of them can do this. Bluecoat ProxySG servers are just one of the most popular brand for this purpose. These servers used inside companies (and inside government organizations) to inspect their own incoming and outgoing SSL/TLS traffic for malware, data leakage, unauthorized usage, etc. To my recollection, there had been no issues with browser fingerprint replication, but it's been a while I've worked with proxy servers.
This is not illegal and easy to do within an organization with the right technology in place. May I gently remind you that the organization provides all IT hardware, software. It certainly has the right to monitor activities within their IT envelop, including in and outbound network traffic to this envelop. In some cases, regulations may require the organization to log access as well.
PS: I apologise for hijacking the subject of this thread...
I think I understand you, but this is an old way to run the business. Nowadays, every corporate laptop is used to access personal data from employees, like banks, facebook, health insurance etc...
This is not legal at all nowadays.
In all that, there are also companies that encourage you to use FB and other social networks to promote their service/brand, monitoring such accounts would be extremely illegal after it was suggested by the company.
In any case, would you be able to spoof a VPN connection? I mean, me connecting to a commercial VPN service? With username and password it may be easier, but not with a certificate and your device registered in your account, if the VPN provides such level of security.