-
-
Notifications
You must be signed in to change notification settings - Fork 357
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Inner working questions #244
Labels
Comments
I am also curious what criteria are used to determine what qualifies as a "spy" connection as opposed to "extra" |
This comment has been minimized.
This comment has been minimized.
Will be done in a dedicated section of the documentation through #256 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Hello,
I have a couple of questions about how this project works, I will be very happy if you could take a moment to answer them:
Is the conversion of traffic logs into spy,extra,update blocklists automatic, or do you do it by hand every time? Could you share some brief details on how you do that?
In the case of IP blocklists, wouldn't they be geo-based? Say your testing is done on a server in the USA, but the user is in Europe. Surely Windows would prefer to connect to a closer server with a different IP?
What happens when the same IP is used for both an important feature and telemetry?
Many thanks!
The text was updated successfully, but these errors were encountered: