This approach is known as “security through obscurity”, and is deprecated in the professional of information security. What one invents, another can discover.
The most secure systems use well-documented algorithms with open-source software — widely scrutinized for bugs or implants, and therefore with well-understood performance limitations. The secrecy comes from good crypto key management. — Eric > On 2017 Apr 10, at 13:58 , Attila Kinali <att...@kinali.ch> wrote: > > And they also learned > that not documenting it is the best protection against people using it.
signature.asc
Description: Message signed with OpenPGP
_______________________________________________ time-nuts mailing list -- time-nuts@febo.com To unsubscribe, go to https://www.febo.com/cgi-bin/mailman/listinfo/time-nuts and follow the instructions there.