By exploiting an unique assault model called colluding-trilateration introduced by the group, finding any targeted person turns into a straight-forward and cheap task without needing any hacking strategy.