Operation Invade Wall Street - Comment #237,623

You are viewing a single comment's thread.

Nathaniel Phillips
Nathaniel Phillips

This is what’s known in the world of internet security as a “Honey-pot”.

The term is taken from honeypots or fly paper which used the sweet scent of honey to lure flies to their untimely demise.

A honey pot can be created by a security firm, law enforcement, research firm, or business entity. It’s basically used to see how the hackers initiated the attack, and gather research on how to stop it and possibly those who started it..

Counter hacking, pure and simple. If you find this a somewhat dubious Anon-op, it’s best not to go through with using either ref ref or LOIC. Remember, the best way to avoid arrest is to never commit a crime in the first place.

+21

Word Up! You must login or signup first!