Just EXCELLENT
We can now easily harvest all their browser cyber ammo (courtesy their friends who fund the browser maker) by:
1.) Running the TOR browser in some sort of memory checking and/or sandboxing environment
2.) Browse www.religious-terroism-discussion.org
3.) Sniff all network traffic
4.) Wait for browser to crash and then inspect traffic. Fire upo debugger to inspect the goodies.