This time we get to the actual data-steal.