TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Security Through Obscurity

1 pointsby esherover 1 year ago

1 comment

esherover 1 year ago
In other words — design your system assuming that your opponents know it in detail. (A former official at NSA&#x27;s National Computer Security Center told me that the standard assumption there was that serial number 1 of any new device was delivered to the Kremlin.)<p><a href="http:&#x2F;&#x2F;catless.ncl.ac.uk&#x2F;Risks&#x2F;25.71.html#subj19" rel="nofollow">http:&#x2F;&#x2F;catless.ncl.ac.uk&#x2F;Risks&#x2F;25.71.html#subj19</a>