>>33
There was something that could have helped, but I forget the name of it now. It connected a virtual machine to tor, and you would run your applications within the virtual machine. So they would have had to first exploit firefox, get control of the virtual machine, and then exploit the virtualization software, and then phone home.