10 Feb
2016
10 Feb
'16
5:07 p.m.
On Wed, 2016-02-10 at 03:37 +0100, coderman wrote:
On 2/9/16, Rayzer <Rayzer@riseup.net> wrote:
... Somewhere on Tor's site I ran into something about how Tail's tor/browser was more secure than the standard torbrowser because of something the tails folks were doing with iptables. Perhaps they're 'steering' traffic away from (or yeah, perhaps towards, take that anyway you like...) certain nodes.
drop packets that bypass the SOCKS proxy path into Tor client. also, makes sure to plug leaks, like:
iptables -A OUTPUT -m conntrack --ctstate INVALID -j DROP
see also, Whonix-Qubes, etc.
The downside of TAILS is that you don't get entry guards, which is pretty major. -- Sent from Ubuntu