people love repeating this little line without a single thought of their own.
security through obscurity is an effective defensive layer with a relatively low implementation effort. it raises the minimum effort required for bypass.
the quote you have parroted is only applicable when obscurity is the only defense layer. when obscurity is used in addition to other defensive layers, it is a great first line of defense.
Ah yes closed source software has such a great track record compared to open source security… lol
You are wrong, if you need to hide your code for it to be secured, then it was never secure to begin with.
But it’s a great way to give a false sense of security through half baked metaphors.