What are everyones thoughts on using stealer logs like for BA? I know social media and email security is a bit more lax but has anyone actually had success in using them for bigger projects?