I understand the difference just fine. You can configure your code to filter these transactions all you want but they are legitimate transactions and whether you censor them or not, they will be able validated by nodes unless you create a fork. That's my point. The only way to stop them, which is what Luke suggests as he says they're exploitative, is to hard fork or uasf.