.

  • Colorfulhipp@lemmy.worldOP
    link
    fedilink
    arrow-up
    8
    arrow-down
    2
    ·
    1 month ago

    Sorry, I think this is very helpful but unfortunately I’m not english + don’t have much knowledge on the matter, so I really don’t understand much of the things you said…

    Thank you for answering, but I must ask you (if you have the time) to explain if they could see or not what I was doing 😭

    • _edge@discuss.tchncs.de
      link
      fedilink
      arrow-up
      9
      ·
      1 month ago

      Short version: No, most likely not.

      They see who you are, but not what you do.

      Slightly longer: Someone can probably see your connections to google and notion and infer that you are using Notion, but they cannot see your Google/Notion account and not what content you are working on. (Also those are very popular tools, unless you are the enemy of the state number 1, why would they care?)

      Even longer: If your laptop or your gmail or your notion account is compromised, they can see everything.

    • ikidd@lemmy.world
      link
      fedilink
      English
      arrow-up
      9
      ·
      1 month ago

      No more than someone running a coffee shop wifi would see. Some basic traffic for name resolution then encrypted traffic for web browsing that they can’t read. Unless your notes application transmits in cleartext (unlikely).

    • SolidGrue@lemmy.world
      link
      fedilink
      English
      arrow-up
      5
      ·
      edit-2
      1 month ago

      You’ve asked a similar question here before this post. Have you been naughty? :-)

      At your uni, you probably have what’s called a reasonable expectation to privacy-- the terms of use for accessing the computer and network facilities would be spelled out at your uni’s IT website.

      The information observed and reported on by their tools most likely amounts to what websites and services you looked up by name, and the IP addresses & ports you accessed while using their network. It will be things like start & stop times, protocol used, number of bytes transferred, and maybe some “flags” on the connection. Flags in this case are special markings on the data flow to give the network hints about how to hand that traffic most efficiently.

      MS Office Online, Notion, Gmail, they all use secured HTTPS connections, so the content is secured between you and the remote service.

      As long as you’re not doing anything illegal or that severely violates the terms of use laid out by the University, nobody will even notice your traffic. Hack away.