Watch this video on YouTube
What characterizes double blind testing in the context of security assessments?