Researchers say Tor-targeted malware phoned home to NSAArs Technica
Aug. 05, 2013
Report: Muslims Forced to Eat Pork, Drink Alcohol As Punishment in China's Islamic 'Re-Education' Camps
Leftists Puzzled Why Koch Brothers Are Funding Political Ads Praising Dems On Immigration
WATCH: Tucker Carlson Makes A Fool Out Of 'White Privilege' Preacher David Burstein
Anti-Trump Leftist Tries to Shoot Up Trump Golf Resort in Florida
John Bolton Sabotages Trump's Peace Talks With North Korea [UPDATE]
Malware planted on the servers of Freedom Hosting—the "hidden service" hosting provider on the Tor anonymized network brought down late last week—may have de-anonymized visitors to the sites running on that service. This issue could send identifying information about site visitors to an Internet Protocol address that was hard-coded into the script the malware injected into browsers. And it appears the IP address in question belongs to the National Security Agency (NSA).