In other words, Tor:

Solari said Winner’s laptop also contained software that could enable her to access online black-markets and buy items — such as a fake ID or passport — without revealing her identity or location.

Source: Accused NSA leaker wanted to ‘burn the White House down’ | New York Post

They can make the same allegation about encryption. Attempting to protect your medical, financial and educational records is a sign of nefarious intent?

Every journalist in existence, if they are any good at all, has Tor on their computer. So do private industry analysts reviewing competitor’s products and government policy plans. Tor is a browser that assists with anonymous browsing and accessing web sites as it hides one’s true IP address from the destination web server. There are numerous and valid reasons to use Tor to access publicly available information.

Coldstreams