Here we will discuss about OpenEDR community, how can we expand? Meetups, etc.
Contribution
We need your contribution more than anything else. There are numerous ways to help this project.
Use it and provide feedback
If you use it, let us know what works and what does not work. Open an issue about it labeling bug, new feature request, open a issue and label it as enchancement
Questions
Open an issue label it question, also please help us to answer the question as well
Tell us about false positives
Improve our rules, correct it if necessary, please use similiar as bug/feature request,
Work on open issues
We love pull requests from everyone. Either bug/feature requests, Take a task Fork, clone the repo and submit a pull request
Testing
We need extensive testing since we might introduce some bugs to make it open source in hurry, please test it in various platforms and report your findings as issues
Documentation
We are lack of effective documentation right now, please provide any kind of knowledgebase, case studies, analysis results, etc.
Spread the word
Last but not least, the more people use OpenEDR, the better we will be, please help us by sharing it via social media or any other channels
Hi, Would someone be able to recommend this type of security but for a personal network at home? I have been the victim of cyber stalking for months now. I changed passwords to my wifi and emails. But this person is able to access my internet activity in real time to some degree. They are also physically stalking. So they somehow know appointments I am scheduling online and then show up there. I spoke to someone at Spectrum internet who found that there was an unauthorized mobile hotspot attached to my account with a device that was connecting to my internet at the same time as I connected my personal and work laptops - and this was happening every day for weeks. Need some solution and would recommend advice. Thank you.
@RRS hope you found a permanent solution in the meantime. I assume you immediately changed your ISP logon credentials and did not allow any connections via compomised accounts and/or devices anymore. If you still cannot be sure that your laptops have not been compromised as well, you should start from scratch, using a clean image, or fresh Windows/other OS install and add back your documents, etc., from a known clean backup.