John's data collection was done via the use of his "anti-virus" software, which was and still is, installed with Root/Admin permissions, giving it the authority to read/write anything on a user's computer, a perfect way to collect incriminating evidence.
Once you have installed this software, it runs 24/7 and is accessible remotely by anyone having access to the back doors that are necessary for A/V software to run.
One has to wonder what he has as far as information goes? He might play a part (Not all) of Trump's we caught 'em all.
Even IT tech. professionals are often lazy with passwords, and information.
Used to be many gated communities had 911 as a gate code to admit first responders. I learned that delivering pizza...
Often people use address or zip code for electronic locks, cellphone codes etc... Learned that from being in the security Industry...
John's data collection was done via the use of his "anti-virus" software, which was and still is, installed with Root/Admin permissions, giving it the authority to read/write anything on a user's computer, a perfect way to collect incriminating evidence.
Once you have installed this software, it runs 24/7 and is accessible remotely by anyone having access to the back doors that are necessary for A/V software to run.