You’ve explored all the IoT device data. It’s time to submit your final accusation. Enter the name of the suspect, your reasoning, and any final flag or code you've uncovered.
Use this final page wisely. Only accurate submissions will be accepted by the system.