Artwork

Content provided by Mateusz Chrobok. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Mateusz Chrobok or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

How your employer sniffs you, or Deep Packet Inspection.

17:33
 
Share
 

Manage episode 476439540 series 3658644
Content provided by Mateusz Chrobok. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Mateusz Chrobok or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
👂 Can an employer snoop on their employees' network traffic and how? Does encryption protect against such voyeurism? Is it even legal? I will do my best to answer these questions. Let’s go! Sources: ❓What is a router? https://www.cloudflare.com/en-gb/learning/network-layer/what-is-a-router/ 🛜 My home network: Ubiquiti UniFi gear, fiber gigabit Internet, CAT6 and CAT3 wiring https://jeffwilcox.blog/2018/04/seattle-network/ 🔐 Data Loss Prevention (DLP) https://www.imperva.com/learn/data-security/data-loss-prevention-dlp/ 🇬🇧 The UK's data protection legislation https://www.gov.uk/data-protection 📟 Electronic Communications Privacy Act of 1986 (ECPA) https://bja.ojp.gov/program/it/privacy-civil-liberties/authorities/statutes/1285#0-0 💉BSNL is injecting code on to your browsers, and here's what it does. #SaveTheInternet https://internetfreedom.in/taking-a-closer-look-at-bsnls-code-injections-savetheinternet-2/ 🤔 What is Deep Packet Inspection? How it Works and Why It Is Important https://www.endpointprotector.com/blog/what-is-deep-packet-inspection-how-it-works-and-why-it-is-important/ 🔍 Deep inspection https://docs.fortinet.com/document/fortigate/6.2.0/cookbook/122078/deep-inspection 🇪🇬 Egypt launches deep-packet inspection system https://www.theverge.com/2014/9/17/6350191/egypt-launches-deep-packet-inspection-with-help-from-an-american 📩 Regex validation of email addresses according to RFC5321/RFC5322 https://stackoverflow.com/questions/13992403/regex-validation-of-email-addresses-according-to-rfc5321-rfc5322 📑 unknown scripts are running and redirecting on click to unknown websties https://stackoverflow.com/questions/51064933/unknown-scripts-are-running-and-redirecting-on-click-to-unknown-websties 🖥️ Technical Tip: Blocking and monitoring Tor traffic https://community.fortinet.com/t5/FortiGate/Technical-Tip-Blocking-and-monitoring-Tor-traffic/ta-p/196239 📊 Analyzing Tor traffic through Deep Packet Inspection? https://security.stackexchange.com/questions/237082/analyzing-tor-traffic-through-deep-packet-inspection Relevant xkcd: https://xkcd.com/208/ © All trademarks, logos and brand names are the property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, trademarks and brands does not imply endorsement. My socials: Instagram @mattchrobok https://www.instagram.com/mattchrobok/ Twixxer @ChrobokMatt https://twitter.com/ChrobokMatt Mastodon https://infosec.exchange/@mateuszchrobok LinkedIn @mateuszchrobok https://www.linkedin.com/in/mateuszchrobok/ TikTok @mattchrobok Facebook https://www.facebook.com/mattchrobok Chapters: 00:00 Intro 00:21 The Rrrole of Rrrrouters 02:19 Insides 04:01 Work 06:56 Leak 08:35 Lawfulness 12:20 More? 15:02 What To Do And How To Live? #data #leak #Surveillance #networking #work
  continue reading

15 episodes

Artwork
iconShare
 
Manage episode 476439540 series 3658644
Content provided by Mateusz Chrobok. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Mateusz Chrobok or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
👂 Can an employer snoop on their employees' network traffic and how? Does encryption protect against such voyeurism? Is it even legal? I will do my best to answer these questions. Let’s go! Sources: ❓What is a router? https://www.cloudflare.com/en-gb/learning/network-layer/what-is-a-router/ 🛜 My home network: Ubiquiti UniFi gear, fiber gigabit Internet, CAT6 and CAT3 wiring https://jeffwilcox.blog/2018/04/seattle-network/ 🔐 Data Loss Prevention (DLP) https://www.imperva.com/learn/data-security/data-loss-prevention-dlp/ 🇬🇧 The UK's data protection legislation https://www.gov.uk/data-protection 📟 Electronic Communications Privacy Act of 1986 (ECPA) https://bja.ojp.gov/program/it/privacy-civil-liberties/authorities/statutes/1285#0-0 💉BSNL is injecting code on to your browsers, and here's what it does. #SaveTheInternet https://internetfreedom.in/taking-a-closer-look-at-bsnls-code-injections-savetheinternet-2/ 🤔 What is Deep Packet Inspection? How it Works and Why It Is Important https://www.endpointprotector.com/blog/what-is-deep-packet-inspection-how-it-works-and-why-it-is-important/ 🔍 Deep inspection https://docs.fortinet.com/document/fortigate/6.2.0/cookbook/122078/deep-inspection 🇪🇬 Egypt launches deep-packet inspection system https://www.theverge.com/2014/9/17/6350191/egypt-launches-deep-packet-inspection-with-help-from-an-american 📩 Regex validation of email addresses according to RFC5321/RFC5322 https://stackoverflow.com/questions/13992403/regex-validation-of-email-addresses-according-to-rfc5321-rfc5322 📑 unknown scripts are running and redirecting on click to unknown websties https://stackoverflow.com/questions/51064933/unknown-scripts-are-running-and-redirecting-on-click-to-unknown-websties 🖥️ Technical Tip: Blocking and monitoring Tor traffic https://community.fortinet.com/t5/FortiGate/Technical-Tip-Blocking-and-monitoring-Tor-traffic/ta-p/196239 📊 Analyzing Tor traffic through Deep Packet Inspection? https://security.stackexchange.com/questions/237082/analyzing-tor-traffic-through-deep-packet-inspection Relevant xkcd: https://xkcd.com/208/ © All trademarks, logos and brand names are the property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, trademarks and brands does not imply endorsement. My socials: Instagram @mattchrobok https://www.instagram.com/mattchrobok/ Twixxer @ChrobokMatt https://twitter.com/ChrobokMatt Mastodon https://infosec.exchange/@mateuszchrobok LinkedIn @mateuszchrobok https://www.linkedin.com/in/mateuszchrobok/ TikTok @mattchrobok Facebook https://www.facebook.com/mattchrobok Chapters: 00:00 Intro 00:21 The Rrrole of Rrrrouters 02:19 Insides 04:01 Work 06:56 Leak 08:35 Lawfulness 12:20 More? 15:02 What To Do And How To Live? #data #leak #Surveillance #networking #work
  continue reading

15 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide

Listen to this show while you explore
Play