Passwords are obvious for exclusion.
Anything else?
Should the network requests be excluded? They are extremely helpful in debugging but can sometimes contain sensitive data.
Being able to record end-users is great. What if we could use the same technique of DOM event recording to record changes in automated tests where the video output generates "how to" manuals via our acceptance testing.
With over 2.5 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.