In other words — design your system assuming that your opponents know it in
detail. (A former official at NSA's National Computer Security Center told
me that the standard assumption there was that serial number 1 of any new
device was delivered to the Kremlin.)<p><a href="http://catless.ncl.ac.uk/Risks/25.71.html#subj19" rel="nofollow">http://catless.ncl.ac.uk/Risks/25.71.html#subj19</a>