Things that can make you pause when researching a security tool for (certain applications and) potential use:
Vendor response: "We don't see that on large, well-behaved networks."
Researcher: "Of course you don't... Your tool can't find it!"
Vendor: *crickets*
π€¨
@sfleetucker I always liked that example! π€
@Synical
"That's very unusual behavior in a major appliance." β Ghostbusters