John's data collection was done via the use of his "anti-virus" software, which was and still is, installed with Root/Admin permissions, giving it the authority to read/write anything on a user's computer, a perfect way to collect incriminating evidence.
Once you have installed this software, it runs 24/7 and is accessible remotely by anyone having access to the back doors that are necessary for A/V software to run.
John's data collection was done via the use of his "anti-virus" software, which was and still is, installed with Root/Admin permissions, giving it the authority to read/write anything on a user's computer, a perfect way to collect incriminating evidence.
Once you have installed this software, it runs 24/7 and is accessible remotely by anyone having access to the back doors that are necessary for A/V software to run.