• Bytemeister@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      3 days ago

      A container of sweet stuff that you get stuck in.

      Basically, a system full of juicy looking data that takes forever to collect and process… And then it was all fake data the whole time.

      Plus, you can hide some real info, like the name of the machine compromised, or info about the attacker’s system in the data, and then when it gets compromised, sold on the black market, and eventually published, you can reference the leaked data to see exactly which system the hackers got into, and get some insights on how they did it.