[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
The Intercept steps up after catching a reporter faking data and sources
Ted Smith wrote:
> On Wed, 2016-02-10 at 03:37 +0100, coderman wrote:
>> On 2/9/16, Rayzer <[email protected]> wrote:
>>> ...
>>> Somewhere on Tor's site I ran into something about how Tail's
>>> tor/browser was more secure than the standard torbrowser because of
>>> something the tails folks were doing with iptables. Perhaps they're
>>> 'steering' traffic away from (or yeah, perhaps towards, take that anyway
>>> you like...) certain nodes.
>> drop packets that bypass the SOCKS proxy path into Tor client. also,
>> makes sure to plug leaks, like:
>>
>> iptables -A OUTPUT -m conntrack --ctstate INVALID -j DROP
>>
>> see also, Whonix-Qubes, etc.
> The downside of TAILS is that you don't get entry guards, which is
> pretty major.
>
MAC is spoofed... Helps. They can figure out, perhaps, where you
are/were, but they can't id the computer.
--
RR
"Through counter-intelligence it should be possible to pinpoint potential trouble-makers ... And neutralize them, neutralize them, neutralize them"
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: OpenPGP digital signature
URL: <http://cpunks.org/pipermail/cypherpunks/attachments/20160210/e1480483/attachment.sig>