We measure information theoretic privacy for source coding by distortion incurred by an eavesdropper. Previously we have shown that the theory and intuition vastly changes depending on the details of the problem statement. In order to elicit a rich and interested theory (one that generalizes the equivocation approach to privacy), we assumed that the eavesdropper additionally had access to the past of the information signal as he formed the reconstruction in real-time. Here we take a different approach---instead the adversary generates a list of reconstructions sequences, and distortion is measured against the best one. This is equivalent to having a henchman assisting the eavesdropper with an additional message. This approach result in a different resource-performance tradeoff.