http://krebsonsecurity.com/2013/08/firefox-zero-day-used-in-child-porn-hunt/
“Ironically, all [the malicious code] does is perform a GET request to a new domain, which is hosted outside of the Tor network, while transferring the same UUID,” David said. “That way, whoever is running this exploit can match any Tor user to his true Internet address, and therefore track down the Tor user.”
Two fixes:
1. Disable Javascript in Tor Browser. YOU SHOULD HAVE BEEN DOING THIS FROM THE GET-GO!
2. Get PORTAL: https://github.com/grugq/portal
2a. Install a new OS that supports Full Disk Encryption (such as Linux Mint 15) onto a trusted laptop
2b. Remove the wireless and bluetooth cards
2c. Install PORTAL on a Raspberry Pi
2d. Get at least 1 WiFi USB Adapter (or multiple! Dispose of them!) for the Pi
2e. Run an ethernet cable from your Pi to your new laptop
If you're really concerned about security, do both. There are far more sinister ways they could have used this exploit to unmask Tor users.
At the very least, turn Javascript the fuck off.