Problem: Ninja Marnau on running a honey pot for research

The following video is a good example to practice identifying value conflicts.

The real world example is presented by Ninja Marnau.

en de fr
MP4 with subtitles

Ninja Marnau is a senior researcher at the CISPA Helmholtz Center for Information Security.

Her research is focused on data privacy and IT security law as well as privacy by design and privacy enhancing technologies (PETs).

You can find out more about Ninja Marnau on her page at the website of CISPA or via her Twitter account @privacy__ninja.


A honey pot is a system that is … vulnerable.

What do malicious attackers do with a honey pot system? (This is a multiple choice question, more than one answer may be correct)

Can the researchers prevent the distributed attack?