you are viewing a single comment's thread.

view the rest of the comments →

[–]magnora7[S] 4 insightful - 1 fun4 insightful - 0 fun5 insightful - 1 fun -  (4 children)

A lot of security works like this. Security through obscurity. It's only safe because almost no one knows how it works.

[–]Mnemonic 4 insightful - 1 fun4 insightful - 0 fun5 insightful - 1 fun -  (3 children)

And that's the worst practice!

Like, it might seem hard to crack, but once it's cracked it's cracked, like for real.

Decrypting a hash by brute-force may take a LONG time, but with a 'obscure' backdoor it might be done quicker, but with that backdoor in place all the 'solvers' would see is an easier way to find opening (easier than brute-forcing).

It's like having a very difficult obstacle course to get to a JACKPOT... A lot more people are going to get through that obstacle course than randomly winning it with a lucky ticket.

[–]Tom_Bombadil 3 insightful - 2 fun3 insightful - 1 fun4 insightful - 2 fun -  (2 children)

If you created a Mythbusters for cybersecurity then it's definitely watch it.

Please don't copy the moustaches, goatee, or crappy hats.

[–]Mnemonic 1 insightful - 2 fun1 insightful - 1 fun2 insightful - 2 fun -  (1 child)

First episode: 'Turns out: don't connect to the internet, don't use USB sticks and only use PC's/Laptops from before 2004 that never connected to the internet... Good luck!'

[–]Tom_Bombadil 1 insightful - 3 fun1 insightful - 2 fun2 insightful - 3 fun -  (0 children)

Episode 002: Programming With An Abacus