logoalt Hacker News

NooneAtAll3today at 3:35 AM9 repliesview on HN

> While security researchers love the entropy of randomized function layouts

I don't think any competent security researcher has anything positive to say about "security through obscurity"

at best this is lawyer position


Replies

lm411today at 5:29 AM

I disagree, obscurity wastes attacker resources and easily fools a lot of simple vulnerability scanners.

Obscurity is totally underrated. Attacker resources are limited.

show 2 replies
jayd16today at 3:01 PM

You would think but in my experience, if you ask to just open something up they'll start talking about "defense in depth" and it suddenly matters a lot.

dagmxtoday at 6:21 AM

Security through obscurity is bad only if the obscurity is the only measure

Geof25today at 2:53 PM

You can consider obscurity as concealment. You can't be attacked if you are not seen. And to be seen attacker needs much more resources to see you.

landr0idtoday at 6:27 AM

It's not something to over-index on, but it's not a strong protection measure. It simply raises the overall cost to attack and analyze a system.

Take the PS5 for example. It has execute-only memory. Even if you find a bug, how do you exploit it if you can't read the executable text of your ROP/JOP target?

Starlevel004today at 8:29 AM

Security through obscurity is an excellent first-line defense, as long as you have other real defenses at the next layer.

m-schuetztoday at 9:13 AM

Security through obscurity is like a bike lock. It can be cracked with the right tools and effort, but massively improves security compared to leaving it out unlocked.

hsbauauvhabzbtoday at 3:47 AM

It’s not about security, it’s about wasting a crackers time.

Some people find cracking them interesting and fun.

show 1 reply
zer0zzztoday at 5:22 AM

ASLR (for example) is a pretty standard technique, I thought all commercial OSes enabled this generally. What's the purpose of picking at this portion?