The assumption is that there would be an attacker attempting to fool the system for personal benefit or malicious purposes, instead of just playing a fun game of mistaken identity. Think tricking a self-driving car into speeding throughstop signs. Or, you could purchase aspecial t-shirtwith va...