Researchers say Tor-targeted malware phoned home to NSAArs Technica
Aug. 05, 2013
Lib Freaks Out After Virtue Signalling Poll Backfires
Christian Refugee Returns to Syria: 'I Was Scared When I Saw How Many Refugees Openly Pledged to ISIS'
Parkland Students Rally in Israel and Dubai to Demand Gun Control in America
'The Boer Project': Swedish Documentary Shows 'Reverse Apartheid' in South Africa
McMaster Pushes For War With Syria, Russia And Iran in Speech at Holocaust Memorial Museum
Malware planted on the servers of Freedom Hosting—the "hidden service" hosting provider on the Tor anonymized network brought down late last week—may have de-anonymized visitors to the sites running on that service. This issue could send identifying information about site visitors to an Internet Protocol address that was hard-coded into the script the malware injected into browsers. And it appears the IP address in question belongs to the National Security Agency (NSA).