Like the ye olden days where one hacker breaks in to an already compromised system, patches the hole they used, kicks out any other 'unwanted' tenants, and installs their own personal backdoor so they get the resources and don't need to share.<p>Hopefully the government didn't do the latter steps.