The Intercept steps up after catching a reporter faking data and sources

coderman coderman at
Tue Feb 9 18:37:33 PST 2016

On 2/9/16, Rayzer <Rayzer at> wrote:
> ...
> Somewhere on Tor's site I ran into something about how Tail's
> tor/browser was more secure than the standard torbrowser because of
> something the tails folks were doing with iptables. Perhaps they're
> 'steering' traffic away from (or yeah, perhaps towards, take that anyway
> you like...) certain nodes.

drop packets that bypass the SOCKS proxy path into Tor client. also,
makes sure to plug leaks, like:

 iptables -A OUTPUT -m conntrack --ctstate INVALID -j DROP

see also, Whonix-Qubes, etc.

best regards,

More information about the cypherpunks mailing list