"They do control the email lists that continue to ask for money," he said. "They still have that." Elsewhere in the interview ...
Use precise geolocation data and actively scan device characteristics for identification. This is done to store and access ...