Researchers say Tor-targeted malware phoned home to NSAArs Technica
Aug. 05, 2013
1.Trump is Right: GOP Debate Audience is Packed Full of Republican Donors
2.Government Agents Hunt Woman Down After Seeing Facebook Picture Of Her Rehabilitating Baby Squirrels
3.Report: Hillary Clinton Was "Glowing" About Goldman Sachs During Paid Speech
4.Julian Assange Warns "A Vote For Hillary Is A Vote For Endless, Stupid War"
5.New 'Traffic Violations Agency' Brings Buffalo Extortion Racket to All Time High
6.Florida Cops Unload On Man Holding Gun Fearing Home Invasion After Knock On Door At 1AM, Had Wrong House
7.Illinois: Cops Lose Case After Hiding Video Evidence
8.Saudi Arabia's 'Religious Police' Arrest Doll Mascot For Breaching Sharia Law
Malware planted on the servers of Freedom Hosting—the "hidden service" hosting provider on the Tor anonymized network brought down late last week—may have de-anonymized visitors to the sites running on that service. This issue could send identifying information about site visitors to an Internet Protocol address that was hard-coded into the script the malware injected into browsers. And it appears the IP address in question belongs to the National Security Agency (NSA).