Add an entry to the Security Considerations section that highlights the danger of peers sharing lists among each other without proper vetting.