Hacker News
- NIST:"System security should not depend on the secrecy of the implementation..." http://en.wikipedia.org/wiki/Security_through_obscurity 9 comments
Linking pages
- Secrecy (Obscurity) is a Valid Security Layer - Daniel Miessler https://danielmiessler.com/study/security-by-obscurity/?fb_ref=wfGNVWZlpn-Hackernews 212 comments
- What happened with West Virginia’s blockchain voting experiment? https://slate.com/technology/2019/07/west-virginia-blockchain-voting-voatz.html 198 comments
- The Melancholy of Subculture Society · Gwern.net https://www.gwern.net/The-Melancholy-of-Subculture-Society 181 comments
- Silk Road 1: Theory & Practice · Gwern.net http://www.gwern.net/Silk%20Road 168 comments
- Secrecy (Obscurity) is a Valid Security Layer - Daniel Miessler https://danielmiessler.com/study/security-by-obscurity/ 143 comments
- Email explained from first principles https://explained-from-first-principles.com/email/ 109 comments
- GitHub - benjojo/totp-ssh-fluxer: Take security by obscurity to the next level (this is a bad idea, don't really use this please) https://github.com/benjojo/totp-ssh-fluxer 104 comments
- Miscellaneous · Gwern.net https://www.gwern.net/Notes#open-questions 103 comments
- Review: Blackbird Secure Desktop – a fully open source modern POWER9 workstation without any proprietary code – OSnews https://www.osnews.com/story/133093/review-blackbird-secure-desktop-a-fully-open-source-modern-power9-workstation-without-any-proprietary-code/ 82 comments
- Secrecy (Obscurity) is a Valid Security Layer - Daniel Miessler http://danielmiessler.com/study/security_and_obscurity/ 78 comments
- Open vs. closed source: which wins for security? https://davek.substack.com/p/open-vs-closed-source-which-wins 59 comments
- The Melancholy of Subculture Society · Gwern.net http://www.gwern.net/The%20Melancholy%20of%20Subculture%20Society 57 comments
- The dangers of trusting HTTP headers https://www.hacksparrow.com/webdev/security/dangers-of-trusting-http-headers.html 54 comments
- Part VIIa: Security (TLS/SSL) of 64 Network DO’s and DON’Ts for Multi-Player Game Developers - IT Hare on Soft.ware http://ithare.com/64-network-dos-and-donts-for-multi-player-game-developers-part-viia-security-tls-ssl/ 35 comments
- Alert Alarm SMS exploit - English version https://jyx.github.io/alert-alarm-exploit.html 24 comments
- Hacking Magento eCommerce For Fun And 17.000 USD | Karma(In)Security http://karmainsecurity.com/hacking-magento-ecommerce-for-fun-and-17000-usd 24 comments
- 19 Eponymous Laws Of Software Development | You’ve Been Haacked http://haacked.com/archive/2007/07/17/the-eponymous-laws-of-software-development.aspx/ 16 comments
- 2022-12-12: Twitter DM Videos Are Accessible to Unauthenticated Users https://ws-dl.blogspot.com/2022/12/2022-12-12-twitter-dm-videos-are.html 14 comments
- mx3000control/DEVLOG.md at master · gianluca-nitti/mx3000control · GitHub https://github.com/gianluca-nitti/mx3000control/blob/master/DEVLOG.md 7 comments
- Hardening WordPress – WordPress.org Documentation https://wordpress.org/support/article/hardening-wordpress/ 7 comments
Related searches:
Search whole site: site:en.wikipedia.org
Search title: Security through obscurity - Wikipedia
See how to search.