Creating a high quality honeypot is a lot harder than I realized. If you want to create a real convincing one you basically have to invent a character, and that character has to be reflected throughout the OS for it to be convincing. A random vm will perhaps capture a poor quality hacker but a really good and "interesting" vm might bring in someone interesting. Ive never thought of applying reverse social engineering to study hackers so I want to see if I can get this right

See if I can honeypot any intelligence circles
Hiding that its running in a vm is going to be another journey by itself. I dont want any of the hardware to look like virtual hardware when the hackers get sysinfo.
So what else do you think I need to consider in creating an authentic looking honeypot?
Ive created a facebook account so there are facebook login cookies, etc
I created a hotmail account
The character for this is female so the vm has a nice pink theme
Im installing all the usual programs a "gullible" female end user would, so therefore my email client is incredimail

With so far as photos, ive cloud backed up my data for a long time now so i have years of pictures. Ive just collected hundreds of pictures throughout the years and put them in the photos directory. The pictures include no personal information of mine. Unless by looking at a picture of a lion you know what game reserve it is in.
Installed itunes
Im a little stumped on how to create authentic documents. I guess i can trawl through mine looking for stuff that could possibly be used. (again, perhaps manuals, pdf books, a fake cv). However, in there I am going to put a data dump anonymous did several years back on multiple police departments (Im hoping this will get interest and theyve not looked at the data in this dump before).
Still to do: copy bieber songs and ancient aliens series to media folder.
The main point of this honey pot is to trace the C&C server, view the payload injection methods and study any activities that might be done. Should be interesting.