The Intercept steps up after catching a reporter faking data and sources

Rayzer Rayzer at
Wed Feb 10 20:59:35 PST 2016

Ted Smith wrote:
> On Wed, 2016-02-10 at 03:37 +0100, coderman wrote:
>> On 2/9/16, Rayzer <Rayzer at> wrote:
>>> ...
>>> Somewhere on Tor's site I ran into something about how Tail's
>>> tor/browser was more secure than the standard torbrowser because of
>>> something the tails folks were doing with iptables. Perhaps they're
>>> 'steering' traffic away from (or yeah, perhaps towards, take that anyway
>>> you like...) certain nodes.
>> drop packets that bypass the SOCKS proxy path into Tor client. also,
>> makes sure to plug leaks, like:
>>  iptables -A OUTPUT -m conntrack --ctstate INVALID -j DROP
>> see also, Whonix-Qubes, etc.
> The downside of TAILS is that you don't get entry guards, which is
> pretty major. 

MAC is spoofed... Helps. They can figure out, perhaps, where you
are/were, but they can't id the computer.

"Through counter-intelligence it should be possible to pinpoint potential trouble-makers ... And neutralize them, neutralize them, neutralize them"

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: OpenPGP digital signature
URL: <>

More information about the cypherpunks mailing list