The first thing I thought of was a course that I took decades ago that discussed using printers for covert channels to get data out of secure networks.
I wonder if any of those are honeypots. It may be interesting to see if any visitors do something clever or unexpected.
I wonder if any of those are honeypots. It may be interesting to see if any visitors do something clever or unexpected.