This sounds similar to an article I read about major league pitchers, who must learn to avoid "tells" for the pitch they are about to throw, while opposing teams pour over video of their previous outings looking for those tells.
Some pitchers even said they would deliberately perform a "tell" that opponents had identified then throw a different pitch.
Once per ip. Presumably there's ip-based rate limiting implemented on top of this, so it's a barrier for scrapers that aggressively rotate ip's to circumvent rate limits.
> The Emacs extensible text editor (among other things) has made a security release to address two vulnerabilities. Emacs 30.1 has fixes for CVE-2025-1244, which is a shell-command-injection flaw in the man.el man page browser and for CVE-2024-53920, which is a code-execution vulnerability in the flymake syntax-checking mode. LWN covered the flymake problems back in December.
Some pitchers even said they would deliberately perform a "tell" that opponents had identified then throw a different pitch.