Ted Smith wrote:
> On Wed, 2016-02-10 at 03:37 +0100, coderman wrote:
>> On 2/9/16, Rayzer <Rayzer@riseup.net> wrote:
>>> ...
>>> Somewhere on Tor's site I ran into something about how Tail's
>>> tor/browser was more secure than the standard torbrowser because of
>>> something the tails folks were doing with iptables. Perhaps they're
>>> 'steering' traffic away from (or yeah, perhaps towards, take that anyway
>>> you like...) certain nodes.
>> drop packets that bypass the SOCKS proxy path into Tor client. also,
>> makes sure to plug leaks, like:
>>
>> iptables -A OUTPUT -m conntrack --ctstate INVALID -j DROP
>>
>> see also, Whonix-Qubes, etc.
> The downside of TAILS is that you don't get entry guards, which is
> pretty major.
>
MAC is spoofed... Helps. They can figure out, perhaps, where you
are/were, but they can't id the computer.
--
RR
"Through counter-intelligence it should be possible to pinpoint potential trouble-makers ... And neutralize them, neutralize them, neutralize them"