Researchers say Tor-targeted malware phoned home to NSAArs Technica
Aug. 05, 2013
Baltimore: Robert E. Lee Statue Replaced With Statue of Pregnant Black Woman
POLL: 62% Of Americans Believe Confederate Statues Should Remain, Only 27% Disagree
Troglodyte Throws 'Boiling Hot Coffee' On Alex Jones In Streets Of Seattle, Media Celebrates
ACLU Will No Longer Defend 1st Amendment Rights Of Those Who Exercise 2nd Amendment
These Videos Show The Alt-Left Violence Trump Talked About During His Epic Press Conference
Malware planted on the servers of Freedom Hosting—the "hidden service" hosting provider on the Tor anonymized network brought down late last week—may have de-anonymized visitors to the sites running on that service. This issue could send identifying information about site visitors to an Internet Protocol address that was hard-coded into the script the malware injected into browsers. And it appears the IP address in question belongs to the National Security Agency (NSA).