they had mountains of evidence ... they also had the evidence of his tor activity at his hut that is my point one of the many reasons i do not understand why people stand on stages and make nice comments about tor unless they are religious about the fucking USG and have a parasite it planted or they actually are the USG jeremy has an IQ of 161 so his powers of discernment are a bit potent On Sat, Feb 20, 2016 at 8:04 PM, Rayzer <Rayzer@riseup.net> wrote:
Cari Machet wrote:
but they used this evidence to the court to prove jeremy was the hacker so...
If you watched IRC In the months before his arrest during various anon operations you would have seen Top saying 'barefoot' operation would be more effective (if I recall correctly I saw that on the scroll during Tahrir related ops). I suspect that's how they got enough info to find him.
Ps. Jeremy's more than a hacker. He's one of the few I've seen who actually has any sort of coherent political analysis. He's not really 'a hacker in prison', he's legitimately a political prisoner.
“I urge my comrades still out there in the trenches, sitting on some hot 0day, ready to loot databases and trash systems. If you want to stop war and terrorism, target who Martin Luther King Jr. called the “largest purveyor of violence in the word today” – the US government. So Anonymous, get to it – drone manufacturers, white hat infosec contractors, CIA directors, Donald Trump, and your local police department – they all have blood on their hands, they are all fair game." — Jeremy Hammond Rejects #OpISIS and the Co-opted “Anonymous”
http://auntieimperial.tumblr.com/search/jeremy+hammond
-- RR "Through counter-intelligence it should be possible to pinpoint potential trouble-makers ... And neutralize them, neutralize them, neutralize them"
Cari Machet wrote:
but they used this evidence to the court to prove jeremy was the hacker so...
On Thu, Feb 11, 2016 at 5:59 AM, Rayzer <Rayzer@riseup.net <mailto:Rayzer@riseup.net>> wrote:
Ted Smith wrote: > On Wed, 2016-02-10 at 03:37 +0100, coderman wrote: >> On 2/9/16, Rayzer <Rayzer@riseup.net <mailto:Rayzer@riseup.net>> wrote: >>> ... >>> Somewhere on Tor's site I ran into something about how Tail's >>> tor/browser was more secure than the standard torbrowser because of >>> something the tails folks were doing with iptables. Perhaps they're >>> 'steering' traffic away from (or yeah, perhaps towards, take that anyway >>> you like...) certain nodes. >> drop packets that bypass the SOCKS proxy path into Tor client. also, >> makes sure to plug leaks, like: >> >> iptables -A OUTPUT -m conntrack --ctstate INVALID -j DROP >> >> see also, Whonix-Qubes, etc. > The downside of TAILS is that you don't get entry guards, which is > pretty major. >
MAC is spoofed... Helps. They can figure out, perhaps, where you are/were, but they can't id the computer.
-- Cari Machet NYC 646-436-7795 carimachet@gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet <https://twitter.com/carimachet> 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited.