Researchers say Tor-targeted malware phoned home to NSAArs TechnicaAug. 05, 2013 |
Claim Jewish Student Was 'Stabbed In The Eye' by Pro-Palestine Protester Draws Mockery After Video Released
Senate Passes $95B Giveaway to Israel, Ukraine, and Taiwan, Combined With TikTok Ban
'These Protesters Belong in Jail': Gov. Abbott Cheers Arrest of Pro-Palestine Protesters at UT Austin
Biden Signs Bill to Give $95B to Israel, Ukraine and Taiwan, Ban TikTok
Mistrial Declared in Case of Arizona Rancher Accused of Killing Migrant Trespasser
Malware planted on the servers of Freedom Hosting—the "hidden service" hosting provider on the Tor anonymized network brought down late last week—may have de-anonymized visitors to the sites running on that service. This issue could send identifying information about site visitors to an Internet Protocol address that was hard-coded into the script the malware injected into browsers. And it appears the IP address in question belongs to the National Security Agency (NSA). Read More |