FUCK V MAJOR i have boycotted tor for sooooo many years now [f18dQhb0S7ks8dDMPbW2n0x6l2B9gXrN7sKj6v5dfb6W5vwkZs7fZjrnW2BpKgF2zlZNzW 8v-hnY1k1H6H0?si=5459291358625792&pi=d5aff1aa-e5f7-43bf-f7a2-35d930 361e0b] [f18dQhb0S7ks8dDMPbW2n0x6l2B9gXrN7sKj6v5dfb6W5vwkZs7fZjrnW2BpKgF2zlZNzW 8v-hnY1k1H6H0?si=5459291358625792&pi=6c9d239d-7091-4d4f-8045-57dd72 462856] On Wed, Feb 10, 2016 at 6:07 PM, Ted Smith <[1]tedks@riseup.net> wrote: On Wed, 2016-02-10 at 03:37 +0100, coderman wrote: > On 2/9/16, Rayzer <[2]Rayzer@riseup.net> wrote: > > ... > > Somewhere on Tor's site I ran into something about how Tail's > > tor/browser was more secure than the standard torbrowser because of > > something the tails folks were doing with iptables. Perhaps they're > > 'steering' traffic away from (or yeah, perhaps towards, take that anyway > > you like...) certain nodes. > > drop packets that bypass the SOCKS proxy path into Tor client. also, > makes sure to plug leaks, like: > > iptables -A OUTPUT -m conntrack --ctstate INVALID -j DROP > > see also, Whonix-Qubes, etc. The downside of TAILS is that you don't get entry guards, which is pretty major. -- Sent from Ubuntu -- Cari Machet NYC [3]646-436-7795 [4]carimachet@gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin [5]+49 152 11779219 Reykjavik [6]+354 894 8650 Twitter: @carimachet <[7]https://twitter.com/carimachet> 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited. References 1. mailto:tedks@riseup.net 2. mailto:Rayzer@riseup.net 3. tel:646-436-7795 4. mailto:carimachet@gmail.com 5. tel:+49 152 11779219 6. tel:+354 894 8650 7. https://twitter.com/carimachet