In computing, a honeypot is used by security researchers to attract attacks in the wild. It is deliberately left insecure. We like to think of our personal electronic devices as secure. But recent revelations have shown, that they might be just as open as a honeypot. All your devices are belong to whom?
Project Website