Researchers say Tor-targeted malware phoned home to NSAArs Technica
Aug. 05, 2013
Megyn Kelly Exposes Hillary Shill 'Miss Universe' Alicia Machado As A Liar
WATCH: Did Hillary Clinton Give Hand Signals to Debate Moderator Lester Holt?
Survey: 'Generation Z' Rejecting Parents' Liberalism And Shifting Hard Right
Germany: Arab Migrants Playing 'Taharrush' Sexual Assault 'Game' At Public Pools
Turkish Terrorist Who Shot Up Cascade Mall Voted Repeatedly Despite Not Being U.S. Citizen
Malware planted on the servers of Freedom Hosting—the "hidden service" hosting provider on the Tor anonymized network brought down late last week—may have de-anonymized visitors to the sites running on that service. This issue could send identifying information about site visitors to an Internet Protocol address that was hard-coded into the script the malware injected into browsers. And it appears the IP address in question belongs to the National Security Agency (NSA).