Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

For one, how carefully did the user input information into fields. If you're making it up, it will be much faster and less hesitant than a legitimate entry.

That and a hundred other data points help create a ML model that reliability identifies illegitimate activity.



Cool! That actually exists, more or less: https://www.nature.com/articles/s41598-018-20462-6




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: