NetGate pfSense vs well versed CyberStalker
-
@Lace not my area if expertise however I suspect your greatest risk is your internet profile. Such as
- School newsletter
- Work advertising
- Etc
Almost all firewall block incoming traffic by default. Allowing incoming traffic is generally only allowed if you setup an internet accessible server. So that’s likely only to be the case if you have set it up.
I suppose if the person who is now stalking you has had access to your computer in the past then they may have set up remote access in which case a firewall won’t help you.
Most firewall allow all outgoing traffic. It is possible to restrict that however that requires significantly more IT management.
In summary it is unlikely your stalker could hack pfsense from the internet without local or previously setup remote access.
-
@Lace https://media.defense.gov/2023/Feb/22/2003165170/-1/-1/0/CSI_BEST_PRACTICS_FOR_SECURING_YOUR_HOME_NETWORK.PDF
-
@Patch correct he compromised my one and only computer my MacBook pro, and even if I wanted to try to use it I can't because
- he had a remote killswitch in the spyware he deployed onto it and bricked when I disclosed publicly with evidence what was happening by him to me
- even if he hadn't have bricked it, I was keeping the infected state as it was part of the evidence I gathered to turn over to authorities; so eventually I was going to stop using it but I had no choice once he bricked it as it forced me to scramble to find funds to replace it
(he stole all my money too prior to these attacks, so until recently I have been unable to afford rebuilding my infrastructure — but now I have financial help from a family member loaning me funds to purchase needed equipment to get back up and running since I not only communicate online a lot but online is the sole source of potential income generating opportunities for me so I really need to get back up and running but without him finding and attacking me again as he has done endlessly on the cellular side)
Anyway, even if I did try to salvage it prior to him killing it remotely ... I heard a speculation from an expert that my network card was likely also infected; and I have no idea how to clean that part of a computer up. So I would still be getting a new laptop anyway
If you think it is unlikely even on a static IP address ISP for him to attack me without 1st gaining inside access, then that makes me hopeful that hardening my home network with pfSense will work out for me. On top of all that I plan to not be with another ISP that issues static IPs, I will now be using a dynamic IP. He did indeed gain "inside access" upon pawning many of my accounts and wrecking all my stuff by unleashing his spyware through my clientside browser using JavaScript webworkers and then operating a Control and Command remote access utilizing Python script that the JavaScript enabled and dumped onto my system and from there it all just got worse. Oddly his spyware was unable to contend with Brave Browser security settings when surfing with TOR, so before he remotely killed my laptop he tried to disable TOR in Brave and then attempted to corrupt Brave. So his spyware was not 100% at infiltrating everything it seemed but it did leverage my installed Adobe Suite against me or tried to as I had locked it down and it kept requesting invasive permissions like Photoshop kept trying to turn on my camera and microphone lol
-
@MaxK-0 thank you for this resource, I did most of this basic stuff but I will admit since I hadn't gotten my life together yet nor had steady income I deprioritized hardening my home network, so the network stuff suggested in the infosheet and associated infosheet sources I sadly didn't do then but am now having to do now
I just figured practicing everything else would be good enough as I didn't think I was lucrative enough yet to become such a valued target, so I totally just procrastinated by still using the ISP modem as my router ... yup I did that even though I knew better ... I just thought other stuff to get back on my feet were a priority since I had the funds to do so and now this happened stealing the remaining funds I hadn't spent. Funny thing is I did buy a switch and a wifi router in anticipation to getting around to setting up my home network but got side tracked so still procrastinated and then this hit me.
I really wonder though, even had I not been using my ISP modem as my home router and wifi access point ... like even if I had set up a basic home network that wasn't fully hardened, he may have ruined all that equipment anyway so IMHO my procrastination didn't help but it might be a blessing in disguise given that I don't have to also repurchase a switch and a wifi router as it was never yet used — as he may have had the capabilities to wreck them too given that he had 1st gained inside access through building false trust with me and deploying malicious JavaScript through browsers in order to deploy his evil Python and SSH scripts on me as a target
Anyway, I am hopeful even as a noob to pfSense that I can restrict certain traffic better with that tool, as well as have it as an additional setup piece that alerts me when something is wrong prior to it reaching other parts of my network let alone my devices
-
@Lace said in NetGate pfSense vs well versed CyberStalker:
deploying malicious JavaScript through browsers
Macs stop using Javascript since Snow Leopard...so, you must have allowed that software to be installed. How old is the MacBook pro and what OS is on it...sounds old as dirt?
-
Doesn't answer my inquiry about pfsense
To answer you, I wish it were as simple as you had imagined. It crashed the non chromium browser when it tried to run multiple sessions using the Google [then] Zero Day session stealer, it wasn't successful the first time but I wasn't sure what was going on only that my browser kept crashing so then I moved over to Brave which runs on some shared Chrome codebase and that is where it became successful all without me clicking anything to download as if an average uneducated Joe
I wish it were as simple as you imagined
Now, what's your opinion on pfsense sharing codebase of BSD which the elite hacker stalking me is highly skilled in?
-
I don't believe a hacker being highly skilled in BSD necessarily means they will be able to hack pfSense just because pfSense may share a code base with BSD. Anything can be hacked but we are all responsible to do the best we can to prevent it - that is why I posted the "Securing Your Home" link. It doesn't matter what a device is based on but how it is used and maintained.
We have all been lax at one point or another and we may have suffered the consequences of procrastination. Some (most?) hackers count on our procrastination to exploit some weakness (outdated firmware, clicked on a suspicious link, used a public wifi spot, etc.).
The pfSense developers and support personnel do their best to ensure a secure and reliable product. Other independent organizations have proved they do a good job. And I think they do a brilliant job! But we have to make sure that anything we use is implemented, used, and maintained in a secure manner. It's not just one thing (like a new router/firewall) that will protect us - it's a comprehensive collection of security best practices.
-
Correct,
but since pfsense will be at the front lines near the DMZ internet / internet modem, that is why I am asking around on how hardened it is after finding out about its foundations were built using OpenBSD in its codebase — remember I am new to pfsense and just 2 days ago I now stumbled upon OPNSense.I agree with your statements, but I am admitting the pfsense will be the 2nd outter layer of my multi layered protection that I am building up to get back fully online safely so it will have to take a ton of attacks well if my attacker ever hones in on me again but I assure I am setting that up a certain way as well where I will no longer have a static IP like I use to since 1998 so this way I am also leveraging security by obscurity in reverting back to dynamic IP use
Thank you btw, you and others here have convinced me it should be good enough at the frontlines of my digital infrastructure; I hope it plays nice with other firewalls because on the inside of my network I will have another firewall deployed in the NAT
-
@Lace said in NetGate pfSense vs well versed CyberStalker:
Doesn't answer my inquiry about pfsense
The point is that even if you had pfSense, the fact that you have Javescript on your Mac is what made your MacBook pro venerable...not even sure how you installed it as it shouldn't install on any MacOS, at least after 2008, and you most likely did not have Mac firewall on. Now, if you had old Adobe software such as Photoshop on Mojave, Apple had a special version of Javescript that one could download from Apple and install; however, Mojave is the last MacOS it would install on.
Remember, we ask questions based on what you shared...you could have narrowed your post to just what you wanted to learn about pfSense without mentioning your hacker experience. pfSense is based on FreeBSD. Please read and reread what Mark shared.
-
@Patch funny thing is I didn't have JavaScript on my Mac nor my Android the way you described (all modern browsers have it enabled or most sites break btw), making assumptions makes an "a" out of u and i
Like what you keep going on about here is not just off topic but had zero to do with my breach LMAO
(also fun fact I had Mac Firewall on too, and 2023 Dec updated cloudbased Adobe suite — which still has an In The Wild Exploit btw)I see you do this to other users on here, btw
(Pro Tip, as a survivor even under a sudo-anon handle I am not over sharing what will be linked back to a public social media post where I gave my evidence to followers there and submitted a report to the iC3 US FBI because this forum is publicly searchable and my attacker has botnets and web crawlers backed by AI-LLM while he remains at large until arrested; but thanks for continually baiting but nope) -
@Lace said in NetGate pfSense vs well versed CyberStalker:
a report to the iC3 US FBI
Not sure why you replied to Patch when I was the last person replied to your post before you responded. Good luck on your FBI report...doubt anyone will be arrested as you don't even know where your hacker lives and whether jurisdiction applies. All modern browsers use HTML5...not javescript...that's why Apple provides you with Safari, a very secure browser. I have been using Apple hardware for more than thirty years.
-
I must have hit the wrong "reply" hyperlink my apologies
Anyway I see you are still making ill informed gross assumptions. I knew my attacker personally, he was in France during the crime and has likely fled by now — my best guess is Brazil due to certain fingerprints he is leaving while still using all my stolen PII to bypass account logins on USAA due to failing at my Credit Union
(he went to find more PII he didn't have by breaking into my USAA to get the make and model of my vehicles to pass the credit questions)
he ended up breaching a chunk of people at my Credit Union in doing so to find my database entry there. The Credit Union had their response team lock all accounts until manually contacted by their clients. He is truly an elite hacker, unlucky for me; but you're welcome go keep assuming whatever your own imagination thinks but it seems to be a waste of time for both of us.This topic has long been answered btw, by two other users here, there is nothing else to contribute now. I am new here and don't know how to close a topic I opened lol
-
@Lace said in NetGate pfSense vs well versed CyberStalker:
He is truly an elite hacker,
Wrong...nothing elite about a common thief...he's a criminal...
@Lace said in NetGate pfSense vs well versed CyberStalker:
I knew my attacker personally,
Know thyself and you won't hang out with bad company. I want you to understand that it takes time to learn and properly configure pfSense...it's not something you just plug in and forget...managing a network, be it a small home network, is still a lot of work. I am picking on you for allowing a highly secure and expensive device to become worthless. The first thing to do when one buys a computer is not put one's name on it until one learns safe computing. Good luck...almost every three months we see post like this...