Hacker News new | past | comments | ask | show | jobs | submit login

Realistically if you do a massive scan you have to handle all kinds of behaviors and this would be a debugging point basically ("oh my script is stuck, let's add a timeout").

The thing is most people will not see the trap as malicious but as a "misconfiguration" on their end or the other person's end (network or ssh in this case).

I see your point but then I never heard of honeypots getting some kind of "revenge" for instance.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: