Figure 1: Honey encryption example.