Worked at Google and can confirm if you typed your password into a non org website you were flagged and asked to reset your PW. The problem is some of the training websites Google used and were Google branded were apparently non org websites. But it shows they are looking for “certain key strokes”
fonix232@fedia.io 10 hours ago
My employer does the same over a proxy. Luckily it can't breach HTTPS, but it was annoying to set all my APs and router and switches and other network nodes to HTTPS just because the damn thing would block the site the moment I sent my password in cleartext to a local device...
Brkdncr@lemmy.world 9 hours ago
You’re sure they aren’t decrypting your traffic? Check the root cert of any site and see if it’s their own root.
dan@upvote.au 6 hours ago
Larger companies that monitor for corporate passwords being entered on third-party sites usually use a browser extension that’s force-installed using Chrome Enterprise.
Brkdncr@lemmy.world 6 hours ago
Why do you say usually? It’s not what I do. I MitM every machine.
BrianTheeBiscuiteer@lemmy.world 9 hours ago
This is definitely a thing.
EncryptKeeper@lemmy.world 7 hours ago
Only if the site they’re visiting isn’t using HSTS, but it’s possible
Ghoelian@piefed.social 7 hours ago
What does that mean? HTTPS is a client-server thing, your APS and switches don’t really have anything to do with that.
Darkassassin07@lemmy.ca 5 hours ago
Setting their management interfaces to be accessed via https because the VPN blocks (after snooping on) http only access would be my guess
porcoesphino@mander.xyz 9 hours ago
Annoying, but ideally it would have been the initial configuration