Can you give us an idea of what type of code might be flagged?
I understand that the goal is to protect the system from being worked around but I and others are curious to know what types of “activities” might be flagged. I’ve seen that personal information and threats are a concern but exactly how does the system scan code?