Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Security by obfuscation of techniques involved. Classic trick. It's the best so long as each security measure and their interactions are fairly secure.


I would say obfuscation is a valid strategy if also coupled with good security practices / algorithmic security. You're no less secure than if you were using the common flavors of good security practices (assuming you didn't create a mistake in rolling your own, which is a difficult assumption) but the effort required to target you is much higher than normal, and you are somewhat shielded from blanket-applying zero days.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: