My company introduced ZScaler Web Security as a corporate internet proxy, that is capable to decrypt all TLS communication through the proxy, using MITM-like method with wild-card server certificate issued by ZScaler CA. My company forces employees to install ZScaler CA certificate manually for all client PCs.
Of course I trust my company and ZScaler never leak or badly exploit my sensitive information, but I think I need to know what kind of potential risks would exist when I use ZScaler + 1Password, that intentionally breaks E2E TLS security concept.
In this sense, I would like to precisely know, what kind of information could be potentially peeked by my company or ZScaler:
- Is the my master password conveyed in clear text over TLS tunnel?
- Are my meta information entries (e.g. site names, login IDs, secure notes, etc..) conveyed in clear text over TLS tunnel?
- Are my passwords conveyed in clear text over TLS tunnel?
I suppose my.1password.com access or API access by 1Password apps may have different conditions, appreciate if I can see such differences.
Thank you very much for your advise in advance,
1Password Version: Not Provided
Extension Version: Not Provided
OS Version: Not Provided
Sync Type: Not Provided