they had mountains of evidence ... they also had the evidence of his tor activity at his hut that is my point one of the many reasons i do not understand why people stand on stages and make nice comments about tor unless they are religious about the fucking USG and have a parasite it planted or they actually are the USG jeremy has an IQ of 161 so his powers of discernment are a bit potent [f18dQhb0S7ks8dDMPbW2n0x6l2B9gXrN7sKj6v5dfb6W5vwkZs7fZjrnW2BpKgF2zlZNzW 8v-hnY1k1H6H0?si=5459291358625792&pi=4d13196a-881d-4c7b-d9ef-f78413 e55508] On Sat, Feb 20, 2016 at 8:04 PM, Rayzer <[1]Rayzer@riseup.net> wrote: Cari Machet wrote: > but they used this evidence to the court to prove jeremy was the > hacker so... If you watched IRC In the months before his arrest during various anon operations you would have seen Top saying 'barefoot' operation would be more effective (if I recall correctly I saw that on the scroll during Tahrir related ops). I suspect that's how they got enough info to find him. Ps. Jeremy's more than a hacker. He's one of the few I've seen who actually has any sort of coherent political analysis. He's not really 'a hacker in prison', he's legitimately a political prisoner. > “I urge my comrades still out there in the trenches, sitting on some > hot 0day, ready to loot databases and trash systems. If you want to > stop war and terrorism, target who Martin Luther King Jr. called the > “largest purveyor of violence in the word today” – the US government. > So Anonymous, get to it – drone manufacturers, white hat infosec > contractors, CIA directors, Donald Trump, and your local police > department – they all have blood on their hands, they are all fair > game." — Jeremy Hammond Rejects #OpISIS and the Co-opted “Anonymous” [2]http://auntieimperial.tumblr.com/search/jeremy+hammond -- RR "Through counter-intelligence it should be possible to pinpoint potential trouble-makers ... And neutralize them, neutralize them, neutralize them" Cari Machet wrote: > but they used this evidence to the court to prove jeremy was the > hacker so... > > On Thu, Feb 11, 2016 at 5:59 AM, Rayzer <[3]Rayzer@riseup.net > > wrote: > > Ted Smith wrote: > > On Wed, 2016-02-10 at 03:37 +0100, coderman wrote: > >> On 2/9/16, Rayzer <[5]Rayzer@riseup.net > > wrote: > >>> ... > >>> Somewhere on Tor's site I ran into something about how Tail's > >>> tor/browser was more secure than the standard torbrowser > because of > >>> something the tails folks were doing with iptables. Perhaps > they're > >>> 'steering' traffic away from (or yeah, perhaps towards, take > that anyway > >>> you like...) certain nodes. > >> drop packets that bypass the SOCKS proxy path into Tor client. > also, > >> makes sure to plug leaks, like: > >> > >> iptables -A OUTPUT -m conntrack --ctstate INVALID -j DROP > >> > >> see also, Whonix-Qubes, etc. > > The downside of TAILS is that you don't get entry guards, which is > > pretty major. > > > > MAC is spoofed... Helps. They can figure out, perhaps, where you > are/were, but they can't id the computer. > > > -- Cari Machet NYC 646-436-7795 [7]carimachet@gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet <[8]https://twitter.com/carimachet> 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited. References 1. mailto:Rayzer@riseup.net 2. http://auntieimperial.tumblr.com/search/jeremy+hammond 3. mailto:Rayzer@riseup.net 4. mailto:Rayzer@riseup.net 5. mailto:Rayzer@riseup.net 6. mailto:Rayzer@riseup.net 7. mailto:carimachet@gmail.com 8. https://twitter.com/carimachet