Cari Machet wrote:
but they used this evidence to the court to prove jeremy was the hacker so...
If you watched IRC In the months before his arrest during various anon operations you would have seen Top saying 'barefoot' operation would be more effective (if I recall correctly I saw that on the scroll during Tahrir related ops). I suspect that's how they got enough info to find him. Ps. Jeremy's more than a hacker. He's one of the few I've seen who actually has any sort of coherent political analysis. He's not really 'a hacker in prison', he's legitimately a political prisoner.
I urge my comrades still out there in the trenches, sitting on some hot 0day, ready to loot databases and trash systems. If you want to stop war and terrorism, target who Martin Luther King Jr. called the largest purveyor of violence in the word today the US government. So Anonymous, get to it drone manufacturers, white hat infosec contractors, CIA directors, Donald Trump, and your local police department they all have blood on their hands, they are all fair game." Jeremy Hammond Rejects #OpISIS and the Co-opted Anonymous
http://auntieimperial.tumblr.com/search/jeremy+hammond -- RR "Through counter-intelligence it should be possible to pinpoint potential trouble-makers ... And neutralize them, neutralize them, neutralize them" Cari Machet wrote:
but they used this evidence to the court to prove jeremy was the hacker so...
On Thu, Feb 11, 2016 at 5:59 AM, Rayzer <Rayzer@riseup.net <mailto:Rayzer@riseup.net>> wrote:
Ted Smith wrote: > On Wed, 2016-02-10 at 03:37 +0100, coderman wrote: >> On 2/9/16, Rayzer <Rayzer@riseup.net <mailto:Rayzer@riseup.net>> wrote: >>> ... >>> Somewhere on Tor's site I ran into something about how Tail's >>> tor/browser was more secure than the standard torbrowser because of >>> something the tails folks were doing with iptables. Perhaps they're >>> 'steering' traffic away from (or yeah, perhaps towards, take that anyway >>> you like...) certain nodes. >> drop packets that bypass the SOCKS proxy path into Tor client. also, >> makes sure to plug leaks, like: >> >> iptables -A OUTPUT -m conntrack --ctstate INVALID -j DROP >> >> see also, Whonix-Qubes, etc. > The downside of TAILS is that you don't get entry guards, which is > pretty major. >
MAC is spoofed... Helps. They can figure out, perhaps, where you are/were, but they can't id the computer.