Researchers say Tor-targeted malware phoned home to NSAArs Technica
Aug. 05, 2013
1.Trump Rips Bill Kristol: "All The Guy Wants to do is Kill People and Go to War"
2.UK Home Secretary Theresa May Hails "Benefits" of Sharia Law
3.Migrants Thank 89-Yr-Old Austrian Man Who Gave Them Euros by Robbing Him
4.The Huffington Post Is What Happens When There's No Men In The Room
5.VIDEO: Telemundo Busted Staging Shot at Anti-Trump Protest
6.Is This The Most Fail Interview Of All Time?
7.VIDEO: Trump Mocks Journo Who Says Calling Elizabeth Warren "Pocahontas" is "Very Offensive"
8.Angry Birds Movie is Red-Pilled Anti-Immigration Propaganda
Malware planted on the servers of Freedom Hosting—the "hidden service" hosting provider on the Tor anonymized network brought down late last week—may have de-anonymized visitors to the sites running on that service. This issue could send identifying information about site visitors to an Internet Protocol address that was hard-coded into the script the malware injected into browsers. And it appears the IP address in question belongs to the National Security Agency (NSA).