Hi Jason! Do you have a citation you can point me to that shows how you do this? We have a purchased set from the same time. Would be happy to compare...
Ya, that’s awesome. So, you identify a subset of likely IDs (reverse engineering their ID production method) and then brute force ID calls and filter against that… is that a correct (super simple) interpretation?