Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

How would you apply this "anything else"? What "anything else" did you have in mind?

If you can come up with some good examples, maybe we can make that a thing.

Until then, we know that "Security by obscurity" is really bad, if that's the only thing you're relying on for security.

Otherwise, that would be "Security by something else plus obscurity", which might or might not be a bad thing, depending on what the "something else" happens to be.



Access lists alone are not sufficient Authentication alone is not sufficient IDS alone is not sufficient Encryption in transit alone is not sufficient Etc.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: