26 Mar
2016
26 Mar
'16
4:14 p.m.
On Sat, Mar 26, 2016 at 12:53:45AM -0400, grarpamp wrote:
Plenty of honeypot research groups you can search for and join. (Or engineer your way into.) Though your TLA's already did and know the list of boxes not to hit.
Isn't this very good defense if true? How they passively recognize honeypot which is disposable computer connected to public wifi and then possibly over Tor/public proxy?