SERVERS: TRUE OR FAKE?
One of the big questions is how you identify a true server from a false one, especially when you might be setting up an elaborate network of 'dummy' servers in the event of an attack.
Your security could be compromised at the planning stages, so fake blueprints might be used with subtle differences. This is called The Frobisher Code.
Tiny differences between the plans for a genuine server, and those for a fake one. Fakes have slight breaks in the circuit flows, which the eye does not observe.
No real server will Break the Flow, even if they Miss the Point.
However, even though examples will be provided, say on a contract, it's very difficult to work out which server in your contract is the Right one. I have never broken this Code.

