logoalt Hacker News

john_strinlaiyesterday at 2:14 PM1 replyview on HN

people love repeating this little line without a single thought of their own.

security through obscurity is an effective defensive layer with a relatively low implementation effort. it raises the minimum effort required for bypass.

the quote you have parroted is only applicable when obscurity is the only defense layer. when obscurity is used in addition to other defensive layers, it is a great first line of defense.


Replies

khalicyesterday at 4:02 PM

Ah yes closed source software has such a great track record compared to open source security… lol

You are wrong, if you need to hide your code for it to be secured, then it was never secure to begin with.

But it’s a great way to give a false sense of security through half baked metaphors.

show 1 reply