Just for a moment, imagine the following scenario:“RandomCompany implements distributed deception platform technology, deploys fake databases and data throughout their environment.” News story breaks that “underground news sites report that RandomCompany’s data has been breached and offered for sale in underground forums”. News outlets ask RandomCompany for comment. RandomCompany reports to news outlets that the data the hackers got was “deceitful data” e.g. the hacker was put to shame and the data they grabbed was actually fake data. Throughout these events, the hacker was selling the data online. How does one hacker get their money back from another? Bug, annoy, harass, or de-escrow their escrow money, placing a shame on the hacker that sold the data while also causing financial harm! News story breaks that “Hacker shamed, sold fake data on internet, adds charges of data fraud to the list of charges”.
End Theoretical Event Timeline:Now you know the POWER of deception and deceitful data .