Back on the original topic, one thing still bothers me. Should this secured network of honeypots be infiltrated for example: from the inside, and being that this network of honeypots (I'm assuming)...