The Intercept steps up after catching a reporter faking data and sources

Ted Smith tedks at riseup.net
Wed Feb 10 09:07:42 PST 2016


On Wed, 2016-02-10 at 03:37 +0100, coderman wrote:
> On 2/9/16, Rayzer <Rayzer at riseup.net> wrote:
> > ...
> > Somewhere on Tor's site I ran into something about how Tail's
> > tor/browser was more secure than the standard torbrowser because of
> > something the tails folks were doing with iptables. Perhaps they're
> > 'steering' traffic away from (or yeah, perhaps towards, take that anyway
> > you like...) certain nodes.
> 
> drop packets that bypass the SOCKS proxy path into Tor client. also,
> makes sure to plug leaks, like:
> 
>  iptables -A OUTPUT -m conntrack --ctstate INVALID -j DROP
> 
> see also, Whonix-Qubes, etc.

The downside of TAILS is that you don't get entry guards, which is
pretty major. 

-- 
Sent from Ubuntu
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: This is a digitally signed message part
URL: <http://lists.cpunks.org/pipermail/cypherpunks/attachments/20160210/70ef6bd3/attachment-0002.sig>


More information about the cypherpunks mailing list