"The end users' front ends simply won't access the fake servers"
"The end users' front ends simply won't access the fake servers, so no problem there."... Front-end must fake it too, otherwise hackers will probe the software and know what to ignore.