Cool speculation by brainfooderÂ
Mark Tortorici on what the act of sourcing actually constitutes, and how similar it is straight up hacking. Both are grabbing information that perhaps the subject did not intend for you to grab. Perhaps less of a blurred line, more a line lightly traced? Have a read and a think,
here