they had mountains of evidence ... they also had the evidence of his tor activity at his hut

that is my point

one of the many reasons i do not understand why people stand on stages and make nice comments about tor unless they are religious about the fucking USG and have a parasite it planted or they actually are the USG

jeremy has an IQ of 161 so his powers of discernment are a bit potent

On Sat, Feb 20, 2016 at 8:04 PM, Rayzer <Rayzer@riseup.net> wrote:

Cari Machet wrote:
> but they used this evidence to the court to prove jeremy was the
> hacker so...

If you watched IRC In the months before his arrest during various anon
operations you would have seen Top saying 'barefoot' operation would be
more effective (if I recall correctly I saw that on the scroll during
Tahrir related ops). I suspect that's how they got enough info to find him.

Ps. Jeremy's more than a hacker. He's one of the few I've seen who
actually has any sort of coherent political analysis. He's not really 'a
hacker in prison', he's legitimately a political prisoner.

> “I urge my comrades still out there in the trenches, sitting on some
> hot 0day, ready to loot databases and trash systems. If you want to
> stop war and terrorism, target who Martin Luther King Jr. called the
> “largest purveyor of violence in the word today” – the US government.
> So Anonymous, get to it – drone manufacturers, white hat infosec
> contractors, CIA directors, Donald Trump, and your local police
> department – they all have blood on their hands, they are all fair
> game." — Jeremy Hammond Rejects #OpISIS and the Co-opted “Anonymous”

http://auntieimperial.tumblr.com/search/jeremy+hammond

--
RR
"Through counter-intelligence it should be possible to pinpoint potential trouble-makers ... And neutralize them, neutralize them, neutralize them"



Cari Machet wrote:
> but they used this evidence to the court to prove jeremy was the
> hacker so...
>
> On Thu, Feb 11, 2016 at 5:59 AM, Rayzer <Rayzer@riseup.net
> <mailto:Rayzer@riseup.net>> wrote:
>
>     Ted Smith wrote:
>     > On Wed, 2016-02-10 at 03:37 +0100, coderman wrote:
>     >> On 2/9/16, Rayzer <Rayzer@riseup.net
>     <mailto:Rayzer@riseup.net>> wrote:
>     >>> ...
>     >>> Somewhere on Tor's site I ran into something about how Tail's
>     >>> tor/browser was more secure than the standard torbrowser
>     because of
>     >>> something the tails folks were doing with iptables. Perhaps
>     they're
>     >>> 'steering' traffic away from (or yeah, perhaps towards, take
>     that anyway
>     >>> you like...) certain nodes.
>     >> drop packets that bypass the SOCKS proxy path into Tor client.
>     also,
>     >> makes sure to plug leaks, like:
>     >>
>     >>  iptables -A OUTPUT -m conntrack --ctstate INVALID -j DROP
>     >>
>     >> see also, Whonix-Qubes, etc.
>     > The downside of TAILS is that you don't get entry guards, which is
>     > pretty major.
>     >
>
>     MAC is spoofed... Helps. They can figure out, perhaps, where you
>     are/were, but they can't id the computer.
>
>
>




--
Cari Machet
NYC 646-436-7795
carimachet@gmail.com
AIM carismachet
Syria +963-099 277 3243
Amman +962 077 636 9407
Berlin +49 152 11779219
Reykjavik +354 894 8650
Twitter: @carimachet <https://twitter.com/carimachet>

7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187

Ruh-roh, this is now necessary: This email is intended only for the
addressee(s) and may contain confidential information. If you are not the
intended recipient, you are hereby notified that any use of this
information, dissemination, distribution, or copying of this email without
permission is strictly prohibited.