Nice thread as it talks a bit about how keep your own stuff secure with companies doing MitM, or have VPN infrastrcuture.
[WayBack] Facebook ist in Bezug auf Kundenzufriedenheit und Vertrauen in Umfragen zieml…
Most larger TLS based web-sites now have HSTS so detect MitM.
Having a proxy locally helps checking the certificates.
Corporate laptops usually has device management. If they use MitM, their root certificates are usually put back automatically. But not all software uses the same root certificate store (:
In the past, I have used [WayBack] cntlm, or VPN (routing only corporate traffic over VPN).
There are corporate VPN variants, which take over the complete routing table or even run arbitrary scripts as root on your box on connect in order to do “endpoint validation”. And then there is OpenVPN, which routes the traffic that the company shall see to the company and lets you use normal connectivity for the rest.
You want openvpn, in all cases.
Another trick I have used is to VPN/SSH out of a corporate box and route some of the traffic over it.
Finally, for some larger corporate VPN software, there is an open source replacement that has better configuration options: OpenConnect supports AnyConnect, Juniper and GlobalProtect.
Related: picture on the right via [WayBack] Torsten Kleinz – Google+
–jeroen