FYI from twatter, sorry if already mentioned
Google technician here. I can confirm.
The Q team are using a set of Virtual Machines (VM) to “hop” from device to device, keeping the source and location secure.
So they use one computer to access another computer at a different location, and so on down the chain.