I think its pretty clear they do a bit of all of the above.
More interesting to me is what data architecture they use to store, tag and index what I image is a vast ocean of data with its provenance. Most leaks have some level of dirty data, missing columns and fields, duplicates, etc. as well...
As I said, no honor among thieves LOL.
Shocking to me that there would be any trust at all. Thats the whole purpose of escrow and a presumably neutral 3rd party.
Looking to hire expert hacker to acquire CRMs from target list of a number of different organizations (mostly non-profit associations). Most are going to be externally hosted cloud like salesforce, mailchimp, actionnetwork, mobilize, etc. though some may just have some gmail sheet signups. For...
This sounds like an advance on what the Chinese did in 2018 with the supermicro chip implants. Even the TEE (Trusted Execution Environment) would be compromised.
But I can imagine this is essentially a back door being built in during manufacture. I don't conceptually understand how this could...