The use of deception is one of many defensive techniques being explored today. In the past, defenders of systems have used deception haphazardly, but now researchers are developing systematic methods of deception. The cornerstone of these methods is internal consistency: projecting a “false reality”, or “fiction”, that the attacker is to accept as reality. We challenge the necessity of this cornerstone, and explore the nature and possible uses of inconsistency in deception as a defense. Categories and Subject Descriptors D.4.6 [Operating Systems]: Security and Protection – access controls, information flow controls, invasive software.