logoalt Hacker News

doytchyesterday at 3:32 PM3 repliesview on HN

I get the mentality but it feels very much like security through obscurity. When did we decide that that was the correct model?


Replies

keedayesterday at 6:08 PM

Security through obscurity is only problematic if that is the only, or a primary, layer of defense. As an incremental layer of deterrence or delay, it is an absolutely valid tactic. (Note, not commenting on whether that is the rationale here.)

show 1 reply
1970-01-01yesterday at 4:01 PM

This is not security via obscurity; it is reducing your attack surface as much as possible.

show 2 replies
Peer_Richyesterday at 3:34 PM

hey cofounder here. since it takes my 16 year old neighbors son 15 mins and $100 claude code credits to hack your open source project

show 13 replies