Think of ID lists as feature rules, as far as data privacy is concerned. If you're targeting on non-anonymous IDs in an insecure environment (e.g. front-end), then curious users could inspect that payload and see the full list or targeting rules.
If you to hide this data, consider a few options:
• payload encryption (not totally secure, just fancy obfuscation)
• "secure string" attributes for targeting (e.g. instead of matching on
user@domain.com, you'd match on the md5() hash of the ID, and that is what the end user would see when inspecting the payload)
• remote evaluation (front-end evaluates on a private backend so users cannot see the rules and ID lists)
• testing on backend only
• doing any sort of sensitive targeting on the backend and injecting the result onto the frontend as a simple attribute (
isTargetedUser: true
)