By using honey pots data, you can hide your critical data to be stolen. and trace any computer or user in contact with the contaminated files. The file itself add a log on any user passing or stealing it. The log-Info that is collected, is Mac address, Ip address, and 4 more ID data. it can be used as forensic data. to locate a specific risk. The file itself holds only a large amount of SALT data. more than the dense code. Global trace by any internet-connected computer.