ixu
12
BTW @sense11, this thread parallels @kevin1’s well-formulated responses to my recent question regarding detection & training:
Here is something I find myself pondering:
- What’s to prevent a badly formed device list corrupting the algorithm?
- What happens if somebody with malicious intent starts to “hack” the lists?