v1.0.3 - The Ironclad Network Update
What's New in v1.0.3
The Ironclad Network Update brings three highly anticipated legacy security features into the modern modular codebase, greatly expanding device anonymity and network-level defense natively on macOS.
This update introduces zero new dependencies, relying entirely on native macOS kernel tools and daemons for maximum performance and security.
🛡️ Hardware IP Firewall Blocklisting (pfctl)
- Native Threat Blocking: Added the
b-a firewall blocklistcommand which aggregates and injects threat intelligence IP lists (FireHOL, EmergingThreats, BinaryDefense) directly into the macOS Packet Filter (pfctl) kernel layer. - Dynamic Rule Mapping: Injects a persistent
<blocklist>table without polluting existing configurations. Completely reversible via dynamicpf.confflushing during uninstallation.
🌐 Aggressive Browser Hardening
- Automated Anti-Fingerprinting: Added the
b-a harden browsercommand to discover installed Firefox and LibreWolf profiles automatically. - Static
user.jsInjection: Surgically injects a highly restrictiveuser.jspayload designed to disable WebRTC, telemetry, safe browsing remote lookups, and fingerprinting vectors. - Resilient Backups: Automatically creates stamped
.oldbackups of your existinguser.jsandprefs.jsfiles for safe and clean restorations.
👻 Persistent MAC Address Spoofing
- Event-Driven Rotation: Redesigned the
b-a wifi auto-spoofLaunchDaemon to utilize native macOSWatchPaths. - Dynamic Triggers: The system now automatically rotates and cryptographically scrambles your Wi-Fi interface MAC address not just at boot, but securely upon sleep wakes and network state changes.
⚙️ Automation & Test Suite Fixes
- 100% Logic Test Pass Rate: Addressed deep execution traps and Mock-leakage within the headless bash testing framework. The tests/unit_logic.sh suite now runs cleanly end-to-end without hanging.
- Python Shim: Bumped the PyPI distribution to
1.0.3for universal package availability.