The Intercept steps up after catching a reporter faking data and sources

coderman coderman at gmail.com
Tue Feb 9 18:37:33 PST 2016


On 2/9/16, Rayzer <Rayzer at riseup.net> wrote:
> ...
> Somewhere on Tor's site I ran into something about how Tail's
> tor/browser was more secure than the standard torbrowser because of
> something the tails folks were doing with iptables. Perhaps they're
> 'steering' traffic away from (or yeah, perhaps towards, take that anyway
> you like...) certain nodes.

drop packets that bypass the SOCKS proxy path into Tor client. also,
makes sure to plug leaks, like:

 iptables -A OUTPUT -m conntrack --ctstate INVALID -j DROP

see also, Whonix-Qubes, etc.


best regards,



More information about the cypherpunks mailing list