Am I secure from network monitoring software if HTTPS is used?

Before answering: If a browser warns you a site is using poor encryption or supplying incorrect identity information, it's important to read the error, understand it, and think hard about whether you want to continue.

Short Answer: Yes, if you're using a trusted device

Long Answer:

If someone is monitoring your connection from another computer (somewhere between you and your bank) and you are using HTTPS, and they are using signed certificates with a suitably strong algorithm, then you are in the clear. (Unless they save the data for years and later read it after the algorithm is broken - but they'd likely be better off breaking into your house and stealing your stuff ;) ).

Chances are, if it's your bank, then they are using signed certificates with a suitably strong cipher. You can verify this by looking at the SSL information for the page, which should be displayed if you look at the page info, click on the Blue or Green name to the left in the address bar with Firefox 3.5, or click on the lock to the right in the address bar in IE8. Firefox will also display the encryption algorithm used if you select More Information after clicking on the coloured area.

If you don't trust the device you're using to connect (such as a computer that is not your own that could have been modified by others), then it's of greater concern. Now, your workplace is likely not going to do anything illegal like look at your banking information; but it is possible for SSL to be undermined if your system is compromised. It could be that your computer is configured to accept certificates signed by a proxy (inspection of the certificate or certificate pinning would thwart this). However, surveillance could be anywhere - a keylogger wouldn't even need to defeat SSL to capture your banking credentials, for instance. SSL makes it so you don't need to trust the connection between two trusted endpoints, but if the endpoint itself is untrusted, all bets are off.


No, not neccessarily. Your company may send your connection through a proxy that acts as a man-in-the-middle. That is: All HTTPS traffic goes from your machine to the proxy, is decrypted there, analyzed, encrypted and sent to the server. Your machine will not use the security certificate from the server, but instead the proxy will generate one for the given website and send that to you, so you really have two HTTPS Connections: From you to the proxy and from the proxy to the server.

In other to make that happen, the company needs to have a certificate server to generate a certificate. Normally the browser would object here and complain that the certificate authority is not trusted, but of course that can be overridden through group policies and the like.

This is not necessarily foul play by the employer though, as this can be part of an anti-virus concept or due to legal reasons.

In your browser, look at the certificate. Especially, look at the certificate authority. If the certificate is issued by a "real" CA like Thawte, VeriSign etc., then that would mean that you're using the one from the server and you should be safe. However, if it is issued by something like "YourCompany-AV" or the like, then you have a man-in-the-middle proxy.