

0·
2 years agoHow do you know that what’s open sourced is what’s installed and running? Someone should verify it and then you’ll have to trust that person as well.
How do you know that what’s open sourced is what’s installed and running? Someone should verify it and then you’ll have to trust that person as well.
I believe this technique is called a “honeypot” in cyper security. Im addition, the honeypot would also gather as much info as possible about the visitors i.e. any potential hacker.