Effects of the Second Use
So far, the attackers seem to be fooled
No attempts have yet reflected break-outs
Attack characteristics remain similar to those before improved deception was implemented
Different populations are apparently unaware of the differences in operation
Until today, nobody knew what the network really looked like… uh oh!