The Intercept steps up after catching a reporter faking data and sources

Rayzer Rayzer at riseup.net
Sat Feb 20 11:04:24 PST 2016


Cari Machet wrote:
> but they used this evidence to the court to prove jeremy was the
> hacker so...

If you watched IRC In the months before his arrest during various anon
operations you would have seen Top saying 'barefoot' operation would be
more effective (if I recall correctly I saw that on the scroll during
Tahrir related ops). I suspect that's how they got enough info to find him.

Ps. Jeremy's more than a hacker. He's one of the few I've seen who
actually has any sort of coherent political analysis. He's not really 'a
hacker in prison', he's legitimately a political prisoner.

> “I urge my comrades still out there in the trenches, sitting on some
> hot 0day, ready to loot databases and trash systems. If you want to
> stop war and terrorism, target who Martin Luther King Jr. called the
> “largest purveyor of violence in the word today” – the US government.
> So Anonymous, get to it – drone manufacturers, white hat infosec
> contractors, CIA directors, Donald Trump, and your local police
> department – they all have blood on their hands, they are all fair
> game." — Jeremy Hammond Rejects #OpISIS and the Co-opted “Anonymous”

http://auntieimperial.tumblr.com/search/jeremy+hammond

-- 
RR
"Through counter-intelligence it should be possible to pinpoint potential trouble-makers ... And neutralize them, neutralize them, neutralize them"



Cari Machet wrote:
> but they used this evidence to the court to prove jeremy was the
> hacker so...
>
> On Thu, Feb 11, 2016 at 5:59 AM, Rayzer <Rayzer at riseup.net
> <mailto:Rayzer at riseup.net>> wrote:
>
>     Ted Smith wrote:
>     > On Wed, 2016-02-10 at 03:37 +0100, coderman wrote:
>     >> On 2/9/16, Rayzer <Rayzer at riseup.net
>     <mailto:Rayzer at riseup.net>> wrote:
>     >>> ...
>     >>> Somewhere on Tor's site I ran into something about how Tail's
>     >>> tor/browser was more secure than the standard torbrowser
>     because of
>     >>> something the tails folks were doing with iptables. Perhaps
>     they're
>     >>> 'steering' traffic away from (or yeah, perhaps towards, take
>     that anyway
>     >>> you like...) certain nodes.
>     >> drop packets that bypass the SOCKS proxy path into Tor client.
>     also,
>     >> makes sure to plug leaks, like:
>     >>
>     >>  iptables -A OUTPUT -m conntrack --ctstate INVALID -j DROP
>     >>
>     >> see also, Whonix-Qubes, etc.
>     > The downside of TAILS is that you don't get entry guards, which is
>     > pretty major.
>     >
>
>     MAC is spoofed... Helps. They can figure out, perhaps, where you
>     are/were, but they can't id the computer.
>
>
>

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: OpenPGP digital signature
URL: <http://lists.cpunks.org/pipermail/cypherpunks/attachments/20160220/feaae511/attachment-0002.sig>


More information about the cypherpunks mailing list