Leonard D Woren wrote, in part:
>Software can be hacked.

Um. And? What's your point? Anything can be hacked:
https://xkcd.com/538/

The phrase "security by obscurity" has bothered me for years. It's *ALL* 
security by obscurity. If you have enough "stuff"-time, money, guns 
(wrenches)-you can get in. The trick is to make it hard enough that you outrun 
the bear.

For example, 256-bit AES can be broken by brute force-if you have until the end 
of time. (And if you'll know it when you see it, another issue.) But that 
"until the end of time" means you can use it to outrun the bear.

When people say "That's security by obscurity", they really mean "That's weak 
security because the barriers aren't high enough". That's all. It's not a big 
revelation.

.phsiii


----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to