> > I found something that in my opinion are nearly evidences.
>
> What exactly are trying to prove here?
>
> > For those who doesn't know my story please read past messages:
> > https://marc.info/?a=155355261500002&r=1&w=2
>
> I think I know you from before. You're the guy claiming to be hacked
> over and over again, right?
>

I'm the guy you find at the link, I'm not other guy. I use only this email for 
the openbsd misc ml.


> > Well, as I said previously my laptop was been hacked then I bought a new 
> > laptop because my suspicious are that the uefi or other firmware was been 
> > hacked (I reinstalled openbsd various
> > iwm0 with vpn download: 0,46 mbit/s upload: 0,55 mbit/s
> > iwm0 without vpn download: 0,50 mbit/s upload: 2,53 mbit/s
> > urtwn0 with vpn download: 20,88 mbit/s upload: 8,49 mbit/s
> > urtwn0: without vpn download: 24,83 mbit/s upload 9,27 mbit/s
>
> What exactly is strange here? Two different cards behave differently.
>

The bandwidth of 0,50 mbit is not normal. I have one router and I'm the only 
user.
Then or the driver is crap (I don't think so) or the card is broken (I tried a 
live linux and it works well) or there some configuration that limit the 
bandwidth.

> > iwm0: round-trip min/avg/max/std-dev = 18.761/6372.615/72372.495/14987.007 
> > ms
> > urtwn0: round-trip min/avg/max/std-dev = 24.068/36.489/878.218/48.120 ms
>
> The thing I find funny is that you insist on being spied on or somehow
> hacked, you act tin-foil paranoid to the point of changing your laptop
> because of some unexplained behavior, yet you use Speedtest.net and
> CloudFlare DNS. Are you trolling or delusional?
>

The thing I find funny is that in world full to the brim of vulnerabilities, 
the NSA that intercept entire country,
vulnerability on the bios/uefi,
and rootkit (this video is five years old 
https://www.youtube.com/watch?v=sNYsfUNegEA and this one that is a firmware 
worm that infect thunderbolt device which infect and other laptop 
https://www.youtube.com/watch?v=Jsdqom01XzY)
or  nic firmware rootkit (https://cryptome.org/2014/02/nic-ssh-rootkit.htm),
vulnerability on cpu, or on the GSM protocols 
(https://www.youtube.com/watch?v=-wu_pO5Z7Pk) ,
openbsd developer paid to insert backdoor on ipsec stack 
(https://lwn.net/Articles/419865/),
vendor, like apple, that pay until $1 milion for a remote kernel exploit, 
government that make cyber warfare and spies whitehouse candidate,
Encryption algorithm that are bugged since 1995 and are removed only in 2015 
(https://en.wikipedia.org/wiki/RC4#Security)
and so on.. I can continue
And you say I'm paranoid ?
LOL I say you are living in some kind of fantasy world!
enjoy https://www.youtube.com/watch?v=1i8XVQ2pswg



> > As I know the traffic shaping is configured by pf with pf.conf, the 
> > following is my pf.conf (I'm sorry I'm not a genius of pf):
> > -------/etc/pf.conf
> > if="urtwn0"
> > #if="iwm0"
om
> > block drop in on ! lo0 proto tcp to port 6000:6010
> > block drop out log proto {tcp udp} user _pbuild
> > block log quick on $if
> >
>
> Neither am I, but aren't there supposed to be some rules that pass
> traffic inbound to your interface?
>

LOL

> > Other strange things that happens on my laptop are the following:
> >
> > 1.  sometimes my openvpn (2 times on 5) fail authentication even I use a 
> > saved file authentication data and pass it the data with --auth-user-pass 
> > /my/path/pass
> >     Then in my opinion it's impossible fails the authentication.
> >
>
> Not really. OpenVPN is a temperamental piece of software that doesn't
> like firewalls very much. In edge cases, it likes to fail, especially if
> you use UDP
>

I don't use UDP

> > 2.  sometimes KeePassXC fails authentication on random site. If I copy the 
> > password and paste it by hand it works.
>
> Both autotype and browser plugins are dependent on so many different
> technologies to work like they should. Like before, it's easy for things
> to go wrong in edge cases.
>

never happens in recent 10 years.

> > 3.  and of course there are people that can spy me and modify suggested 
> > videos on youtube. Please do not comment this because I know it's very 
> > subjective.
>
> Same as before. Tinfoil hat paranoia yet you still use YouTube?
>

What is tinfoil ? and what's wrong in youtube ?


> > As I said previously in my opinion there is 0day on how is implemented the 
> > tcp/ip stack in the kernel.
> > And the vulnerability can be exploited by a mitm attack from the home 
> > router.
> > Thank you Cord.
>
> And the proof is where? You are providing sparse information, impossible
> PF configuration files, and anecdotal "evidence" that can be easily
> attributed to user error. Instead of trying to explore how programs
> you're using work, you blame OpenBSD. The only thing you make evident is
> your lack of analytical approach to problem solving and ignorance of the
> mailing list rules. Where is dmesg output? What HW are you using? What
> browser? What router?
>
> Please take the list seriously or go away.


I don't think that dmesg has something to do with security.
User error happens 2 or 3 times, not 5 or 7 times a day.
The openvpn error auth happens 2 times on 5.
As I said here:
https://marc.info/?l=openbsd-misc&m=155438009326648&w=2
there was been also other things like ssh key stealing.
and others like, webmail session not closed well. I mean the webmail session 
was remained opened also with the properly logout procedure.
This is not important how many times happens because just one session not 
properly close is a huge hole in my mailbox. The attacker just need the session 
cookie.
But all those things was written in the previous email messages.
See you knight in shining armor.



Reply via email to