Hackers, researchers and security experts are desperately trying to determine the source of a piece of malware that, using vulnerability in the Firefox browser, identified users of the private Tor network. The Tor network is comprised of a number of proxy nodes through which a user’s connection is routed, creating randomly generated private
Tor Browser Malware Has Online Privacy Advocates Worried
Researchers are trying to determine the source of a piece of malware that identified users of the private Tor network.