Their actions are usually carried out to the popular good. As an example, They could exploit a vulnerability to raise recognition that it exists, but contrary to white hat hackers, they do so publicly. This alerts malicious actors into the existence with the vulnerability. (Note that Apple plan restricts apple https://innpoland.pl/150189,medyczna-marihuana-w-polsce-nie-kupimy-jej-w-aptekach-bo-wyprzedala-sie