This approach is known as “security through obscurity”, and is deprecated in 
the professional of information security. What one invents, another can 
discover.

   The most secure systems use well-documented algorithms with open-source 
software — widely scrutinized for bugs or implants, and therefore with 
well-understood performance limitations. The secrecy comes from good crypto key 
management.

— Eric

> On 2017 Apr 10, at 13:58 , Attila Kinali <att...@kinali.ch> wrote:
> 
> And they also learned
> that not documenting it is the best protection against people using it.

Attachment: signature.asc
Description: Message signed with OpenPGP

_______________________________________________
time-nuts mailing list -- time-nuts@febo.com
To unsubscribe, go to https://www.febo.com/cgi-bin/mailman/listinfo/time-nuts
and follow the instructions there.

Reply via email to