• jet@hackertalks.com
    link
    fedilink
    English
    arrow-up
    1
    ·
    5 months ago

    Saying something has the capabilities of a honeypot, is the correct thing to do when we’re assessing our threat model.

    Is it a honey pot? I don’t know. It’s unknowable. We have to acknowledge the the actual capabilities of the software as written and the data flows and the organizational realities.