Honeytokens contain digital data created and monitored solely as indicators of digital theft. They can be real data containing a “marker” — fake data that simply doesn’t exist in the real world. Fake email accounts have long been used to capture or get early warning of spammers. Fake executables can be used to send back information about the hacker’s environment, such as the IP address, found names, and so on. If you really want to catch a thief, why not think like a marketer?”]

