If the candidate exploit is eligible for acquisition, we ask the security researcher to describe the exploit capabilities. If interested, we will make our best offer based on the description provided to us. Should the researcher decides to proceed with the sale, we ask the seller to submit her/his findings with all the supporting information. When the seller submit her/his findings, our team revises and validates the exploit. If the exploit is found to not match our reliability requirements, or if the same does not work on the intended system, we give the security research the possibility, but not the obligation, to improve on the submission. If, at any time, the exploit is found to match our requirements and to work as described, Zeronomicon pays the seller using the payment methods detailed below.