This page can be used to simulate the Signals payload being hijacked from one browser to another.
Use the same details from the Simulate Page, along with the Payload (use the Hijack Payload slider) and paste it into the below.
Next evaluation in:
Paste in the payload from the Simulate page:
Click the Start Simulation button to inject the hijacked SDK Payload and pass that to a server-side API that will make the P1 Risk Evaluation call
Click the Get Decision button to see the details of the Risk Evaluation decision