Security Through Obscurity

This cluster centers on debates about 'security through obscurity,' with most comments criticizing it as ineffective or illusory security, while some defend its practical value in certain contexts.

➡️ Stable 0.5x Security
2,490
Comments
20
Years Active
5
Top Authors
#9644
Topic ID

Activity Over Time

2007
2
2008
11
2009
28
2010
50
2011
62
2012
112
2013
141
2014
137
2015
99
2016
182
2017
194
2018
151
2019
123
2020
308
2021
174
2022
145
2023
182
2024
221
2025
158
2026
10

Keywords

IT ECDSA I.e WTF wikipedia.org DRM security obscurity obscurity security encryption key secret secure private key cryptographic stakes

Sample Comments

stakhanov Sep 23, 2019 View on HN

Well, that sounds a bit like "security by obscurity". That ain't good.

josefresco Oct 29, 2013 View on HN

You know what they say about security through obscurity...

malka Jan 14, 2014 View on HN

There is no 'Security through obscurity'. At best, you will have the illusion of security, wich is worse than no security at all.

plussed_reader Jan 17, 2024 View on HN

When security through obscurity isn't.

aksss Feb 5, 2020 View on HN

security by obscurity is not security.

jgalt212 Dec 28, 2021 View on HN

once again, maybe security through obscurity is not the worst idea...

lectrick Sep 27, 2013 View on HN

Security via obscurity. Got it.http://en.wikipedia.org/wiki/Security_through_obscurity

dpritchett Sep 11, 2012 View on HN

Yep. Security through obscurity is no security at all.

aviraldg Oct 9, 2013 View on HN

Security through obscurity usually isn't a good idea.

colejohnson66 Nov 23, 2017 View on HN

Isn’t that just security through obscurity?