| ▲ | mywittyname 3 hours ago | |
Just be aware, this is something that will be noticed. I've been building analytics systems for a while now and have had people do this. Usually it gets picked up by the anomaly detection system or as an alert in the ETL pipeline when we try to transform it. Personally, I just plop it into a "dead letter office" table, then verify it's not malicious. But it's possible other companies would handle this differently. | ||