Thanks for the explanation, so to sum it up, if I grab a random email from a known db leak and add a password such as ''asjfakjksg'' it will count the hit as private because the password does not match the public db leak? If that's the case, which I'm sure it is, the passwords here are clearly either generated or fake, which means the hits might be private for the program he's using but they are actually not valid for any site that he could be trying to get hits for.
If you'll use MYRZ antipublic over PUBLIC combo and add random generate password result will be 100% private (combo is also useless).
If you'll use IHBP antipublic over PUBLIC combo which checks just email and even with generated passwords results will be 0% private.
Those password in that combo are not generated that's for sure, it was not seller intention - its kind of "shit happens" while dahashing. It was not on purpose, and I doubt he made it himself, but also I can check the whole combo over Keca antipublic and be sure about how private it is in range of "emails" listed in database leaks. I said many times that people should use KECA ANTIPUBLIC since its most reliable.
He got tricked by MYRZ antipublic, and own lack of knowledge, that's all. Combo is semi shit (ima checking if really, will post output later), don't need to talk about that part, but I wouldn't call it to scam on purpose for 100%
mail access
well 40-50% is actually private and worth it price I guess.