Ted Smith wrote:
On 2/9/16, Rayzer <Rayzer@riseup.net> wrote:
... Somewhere on Tor's site I ran into something about how Tail's tor/browser was more secure than the standard torbrowser because of something the tails folks were doing with iptables. Perhaps they're 'steering' traffic away from (or yeah, perhaps towards, take that anyway you like...) certain nodes. drop packets that bypass the SOCKS proxy path into Tor client. also, makes sure to plug leaks, like:
iptables -A OUTPUT -m conntrack --ctstate INVALID -j DROP
see also, Whonix-Qubes, etc. The downside of TAILS is that you don't get entry guards, which is
On Wed, 2016-02-10 at 03:37 +0100, coderman wrote: pretty major.
MAC is spoofed... Helps. They can figure out, perhaps, where you are/were, but they can't id the computer. -- RR "Through counter-intelligence it should be possible to pinpoint potential trouble-makers ... And neutralize them, neutralize them, neutralize them"