Leonard D Woren wrote, in part: >Software can be hacked. Um. And? What's your point? Anything can be hacked: https://xkcd.com/538/
The phrase "security by obscurity" has bothered me for years. It's *ALL* security by obscurity. If you have enough "stuff"-time, money, guns (wrenches)-you can get in. The trick is to make it hard enough that you outrun the bear. For example, 256-bit AES can be broken by brute force-if you have until the end of time. (And if you'll know it when you see it, another issue.) But that "until the end of time" means you can use it to outrun the bear. When people say "That's security by obscurity", they really mean "That's weak security because the barriers aren't high enough". That's all. It's not a big revelation. .phsiii ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN