ixu
                
              
              
                  
                  
              12
              
             
            
              BTW @sense11, this thread parallels @kevin1’s well-formulated responses to my recent question regarding detection & training:
Here is something I find myself pondering:
- What’s to prevent a badly formed device list corrupting the algorithm?
 
- What happens if somebody with malicious intent starts to “hack” the lists?