Researchers say Tor-targeted malware phoned home to NSAArs Technica
Aug. 05, 2013
Polish MP Schools BBC Host On Refugees: 'How Many Terror Attacks Have You Had In London?'
Trump Skips Ramadan Dinner For The First Time In Nearly Two Decades
Protesters Blow Whistles As Trump Sends 'Thoughts And Prayers' to Rep Steve Scalise
Gohmert: FBI's Refusal to Label Scalise Shooting Terrorism Suggests DOJ Compromised by Obama Holdovers
DEMS LOSE AGAIN: Ossoff Loses Second Round EVEN HARDER Despite Spending $22 Million
Malware planted on the servers of Freedom Hosting—the "hidden service" hosting provider on the Tor anonymized network brought down late last week—may have de-anonymized visitors to the sites running on that service. This issue could send identifying information about site visitors to an Internet Protocol address that was hard-coded into the script the malware injected into browsers. And it appears the IP address in question belongs to the National Security Agency (NSA).