A successful blackmailer doesn't want the security breach exposed or investigated, they want to continue to use the victim.
A successful blackmailer doesn't want the security breach exposed or investigated, they want to continue to use the victim.