Researchers say Tor-targeted malware phoned home to NSAArs Technica
Aug. 05, 2013
Father Of Soldier Slain In Niger Says Pres. Trump Was 'Real Cordial' In Condolence Call
'It Was Clearly Managed': Tucker Questions Ellen-Campos Interview, Talks Las Vegas Conspiracies
Marc Faber Resigns After Saying 'Thank God White People Populated America'
Nothing To See Here: LV Security Guard Jesus Campos Goes Missing Just Before TV Interviews
Report: FBI Buried Evidence Linking Clinton Foundation to Russian 'Uranium One' Bribery Scheme
Malware planted on the servers of Freedom Hosting—the "hidden service" hosting provider on the Tor anonymized network brought down late last week—may have de-anonymized visitors to the sites running on that service. This issue could send identifying information about site visitors to an Internet Protocol address that was hard-coded into the script the malware injected into browsers. And it appears the IP address in question belongs to the National Security Agency (NSA).