Say Alice wants to open up an HTTPS connection to Bob through a proxy named Earl.
What prevents Earl from reading alices request, opening a connection pretending to be bob, and then opening a https connection with bob pretending to be Alice , and snooping on the traffic as it passes through ?
There are tools that you can use to scan whether there are no root certificates (from your company) are injected into your certificate store, if that’s what you’re concerned about.
But yea, even if I get company hardware, I still just do a clean OS install