Nevermind hackers. Look up “corporation in the middle” attacks, which is a prime example of subverting secure channels at scale.
If you don’t own the hardware, nothing you do on it is truly private. Ditto if someone else has admin access to your hardware (eg BYOD scenarios) . Inserting a root certificate into the OS is trivial in both cases.
Nevermind hackers. Look up “corporation in the middle” attacks, which is a prime example of subverting secure channels at scale.
If you don’t own the hardware, nothing you do on it is truly private. Ditto if someone else has admin access to your hardware (eg BYOD scenarios) . Inserting a root certificate into the OS is trivial in both cases.