Very interesting. Some of it was over my head, but it didn't appear that the goal was surveillance or circumvention of security measures (aside from circumventing some boot verification of files). I assume the counterfeiters' goal is simply to make money. Anyone on the F-Secure team here by chance, and have a comment on that conclusion?