By exploiting an unique attack model called colluding-trilateration introduced by the group, finding any targeted individual turns into a straight-forward and low priced task without using any hacking strategy.