Another angle: maybe they're a provider of tools or software that help users manage FRP on their own devices. But without proper authorization, any tool that helps bypass FRP could be used for malicious purposes.