Wireshark-users: [Wireshark-users] Seeking Assistance in Addressing Targeted Surveillance

From: Devolution <info@xxxxxxxxxxxxxx>
Date: Tue, 23 Jan 2024 21:21:01 +0100
Dear Wireshark Community,

I hope this message finds you well. I am reaching out to seek your expertise and assistance in a matter of utmost urgency. I believe I am a target of direct surveillance, and I am determined to understand and counter the threat. I am outlining my situation below, along with the proposed solutions involving cascade network, IPsec routing, server installation, and the use of a DNS resolver on 9.9.9.9. I kindly request your guidance on how to proceed with analyzing and mitigating the identified issues.

1. Surveillance Situation: I have reason to believe that I am being directly targeted for surveillance, and I have observed unusual network activities, unauthorized access attempts, and potential data interception. This has raised serious concerns about the security and privacy of my digital communications.

2. Proposed Solutions: a. Cascade Network: Implementing a cascade network to enhance security and create a more resilient infrastructure. b. IPsec Routing: Configuring IPsec routing to encrypt communication and protect against unauthorized access. c. Server Installation: Deploying secure servers to ensure the integrity and confidentiality of my data. d. DNS Resolver on 9.9.9.9: Utilizing the 9.9.9.9 DNS resolver for improved privacy and protection against DNS-based attacks.

3. Request for Assistance: I am seeking guidance and assistance from the Wireshark community to: a. Analyze Network Traffic: Utilize Wireshark to analyze network traffic and identify potential threats or malicious activities. b. Implement Security Measures: Provide recommendations on implementing the proposed solutions to enhance network security. c. Investigate Intrusion Attempts: Assist in identifying and investigating intrusion attempts on my network.

4. Collaboration and Contributions: I am open to collaboration and contributions from the Wireshark community to collectively address and mitigate the identified threats. Any insights, tools, or expertise you can offer would be highly appreciated.

5. Next Steps: I am eager to commence work on securing my network and understanding the attacker's setup. Your guidance on where to start, tools to use, and best practices in such situations would be invaluable.

Please reply to this email or join the discussionto share your insights and suggestions. Your support in this matter is crucial, and I am confident that, together, we can work towards securing my digital environment.

Thank you for your time and consideration.

Best regards,

Zeitgeist