[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

The Intercept steps up after catching a reporter faking data and sources



On Wed, 2016-02-10 at 03:37 +0100, coderman wrote:
> On 2/9/16, Rayzer <[email protected]> wrote:
> > ...
> > Somewhere on Tor's site I ran into something about how Tail's
> > tor/browser was more secure than the standard torbrowser because of
> > something the tails folks were doing with iptables. Perhaps they're
> > 'steering' traffic away from (or yeah, perhaps towards, take that anyway
> > you like...) certain nodes.
> 
> drop packets that bypass the SOCKS proxy path into Tor client. also,
> makes sure to plug leaks, like:
> 
>  iptables -A OUTPUT -m conntrack --ctstate INVALID -j DROP
> 
> see also, Whonix-Qubes, etc.

The downside of TAILS is that you don't get entry guards, which is
pretty major. 

-- 
Sent from Ubuntu
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: This is a digitally signed message part
URL: <http://cpunks.org/pipermail/cypherpunks/attachments/20160210/70ef6bd3/attachment.sig>