Their Proprietary Obfuscator Employs:
Extreme Control Flow
Extreme Scope Mangling
Function Packing (Array Bundling)
Prototype Hijacking
Extreme Proxying Techniques
Runtime Payload Evaluation
Extreme Anti Parsing Techniques
Logic Traps
And More...
Suspected Obfuscator Used: Closure Compiler (Private Variant)