In theory, someone could have exfiltrated sensitive data, but it would be an extremely tedious undertaking.