Privacy Workshop #9 - Analysis of a Compromised System