On Wed, 2016-02-10 at 03:37 +0100, coderman wrote:
> On 2/9/16, Rayzer <Rayzer@riseup.net> wrote:
> > ...
> > Somewhere on Tor's site I ran into something about how Tail's
> > tor/browser was more secure than the standard torbrowser because of
> > something the tails folks were doing with iptables. Perhaps they're
> > 'steering' traffic away from (or yeah, perhaps towards, take that anyway
> > you like...) certain nodes.
>
> drop packets that bypass the SOCKS proxy path into Tor client. also,
> makes sure to plug leaks, like:
>
> iptables -A OUTPUT -m conntrack --ctstate INVALID -j DROP
>
> see also, Whonix-Qubes, etc.
The downside of TAILS is that you don't get entry guards, which is
pretty major.
--
Sent from Ubuntu