Cari Machet wrote:
> but they used this evidence to the court to prove jeremy was the
> hacker so...
If you watched IRC In the months before his arrest during various anon
operations you would have seen Top saying 'barefoot' operation would be
more effective (if I recall correctly I saw that on the scroll during
Tahrir related ops). I suspect that's how they got enough info to find him.
Ps. Jeremy's more than a hacker. He's one of the few I've seen who
actually has any sort of coherent political analysis. He's not really 'a
hacker in prison', he's legitimately a political prisoner.
> “I urge my comrades still out there in the trenches, sitting on some
> hot 0day, ready to loot databases and trash systems. If you want to
> stop war and terrorism, target who Martin Luther King Jr. called the
> “largest purveyor of violence in the word today” – the US government.
> So Anonymous, get to it – drone manufacturers, white hat infosec
> contractors, CIA directors, Donald Trump, and your local police
> department – they all have blood on their hands, they are all fair
> game." — Jeremy Hammond Rejects #OpISIS and the Co-opted “Anonymous”
http://auntieimperial.tumblr.com/search/jeremy+hammond
--
RR
"Through counter-intelligence it should be possible to pinpoint potential trouble-makers ... And neutralize them, neutralize them, neutralize them"
Cari Machet wrote:
> but they used this evidence to the court to prove jeremy was the
> hacker so...
>
> On Thu, Feb 11, 2016 at 5:59 AM, Rayzer <Rayzer@riseup.net
> <mailto:Rayzer@riseup.net>> wrote:
>
> Ted Smith wrote:
> > On Wed, 2016-02-10 at 03:37 +0100, coderman wrote:
> >> On 2/9/16, Rayzer <Rayzer@riseup.net
> <mailto:Rayzer@riseup.net>> wrote:
> >>> ...
> >>> Somewhere on Tor's site I ran into something about how Tail's
> >>> tor/browser was more secure than the standard torbrowser
> because of
> >>> something the tails folks were doing with iptables. Perhaps
> they're
> >>> 'steering' traffic away from (or yeah, perhaps towards, take
> that anyway
> >>> you like...) certain nodes.
> >> drop packets that bypass the SOCKS proxy path into Tor client.
> also,
> >> makes sure to plug leaks, like:
> >>
> >> iptables -A OUTPUT -m conntrack --ctstate INVALID -j DROP
> >>
> >> see also, Whonix-Qubes, etc.
> > The downside of TAILS is that you don't get entry guards, which is
> > pretty major.
> >
>
> MAC is spoofed... Helps. They can figure out, perhaps, where you
> are/were, but they can't id the computer.
>
>
>