10 Feb
2016
10 Feb
'16
2:37 a.m.
On 2/9/16, Rayzer <Rayzer@riseup.net> wrote:
... Somewhere on Tor's site I ran into something about how Tail's tor/browser was more secure than the standard torbrowser because of something the tails folks were doing with iptables. Perhaps they're 'steering' traffic away from (or yeah, perhaps towards, take that anyway you like...) certain nodes.
drop packets that bypass the SOCKS proxy path into Tor client. also, makes sure to plug leaks, like: iptables -A OUTPUT -m conntrack --ctstate INVALID -j DROP see also, Whonix-Qubes, etc. best regards,