The document contains log entries from Netflix.com that include information about user IDs, consent data, and identifiers used for authentication. Different endpoints are called to log user activity and interactions with the site. Security-related information is included like encrypted identifiers and keys.
The document contains log entries from Netflix.com that include information about user IDs, consent data, and identifiers used for authentication. Different endpoints are called to log user activity and interactions with the site. Security-related information is included like encrypted identifiers and keys.
The document contains log entries from Netflix.com that include information about user IDs, consent data, and identifiers used for authentication. Different endpoints are called to log user activity and interactions with the site. Security-related information is included like encrypted identifiers and keys.