Hi mchain,

And as you can see from the scan results here, it is all in the cloud: http://retire.insecurity.today/#!/scan/39caa22316339c9917d39fe4a57d552e05e681bad57ae17b87fe58de041e8410

Affecting compiled.js: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fd3mwhxgzltpnyp.cloudfront.net%2Flocal-storage%2Fjstorage.js = Malware…

See: https://www.virustotal.com/pl/url/568140e9c1009c7cb645f122c0a2f4c9c36ef89908aacff01f57af7bcc032bc4/analysis/1491168067/

and: http://toolbar.netcraft.com/site_report?url=+209.141.56.34 or
https://urlscan.io/result/c442d573-02f8-4257-8807-7fca9d750053#summary
and: https://aw-snap.info/file-viewer/?protocol=not-secure&tgt=209.141.56.34%2F&ref_sel=GSP2&ua_sel=ff&fs=1

Excessive server info proliferation: nginx/1.0.15 OpenSSH 5.3 (protocol 2.0) exploitable

F-status: https://observatory.mozilla.org/analyze.html?host=sameid.net

polonus (volunteer website security analyst and website error-hunter)