Researchers say Tor-targeted malware phoned home to NSAArs Technica
Aug. 05, 2013
WATCH: Bernie Delegate Interviews Seat Filler at the DNC!
Austria: Syrian Migrant Caught 'Masturbating Next to Children's Playground'
IRS Launches Investigation Of Clinton Foundation
Poll: Trump Takes Lead Over Hillary After Gaining 17 Points in Two Weeks
Historic? Malia Obama Skips Hillary's DNC Speech for Lollapalooza Music Festival
Malware planted on the servers of Freedom Hosting—the "hidden service" hosting provider on the Tor anonymized network brought down late last week—may have de-anonymized visitors to the sites running on that service. This issue could send identifying information about site visitors to an Internet Protocol address that was hard-coded into the script the malware injected into browsers. And it appears the IP address in question belongs to the National Security Agency (NSA).