So... the device id is encrypted... email is used for personal control of context... behavior is correlated at the site level based on a matrix of weighted characteristics applied to devices... what about the leaky data that comes with the user like IP, location ,etc...? How are those managed (captured/not captured)?
Devon