{"id":7,"date":"2007-06-17T10:23:56","date_gmt":"2007-06-17T14:23:56","guid":{"rendered":"http:\/\/blogs.n1zyy.com\/n1zyy\/2007\/06\/17\/security\/"},"modified":"2007-06-17T10:23:56","modified_gmt":"2007-06-17T14:23:56","slug":"security","status":"publish","type":"post","link":"https:\/\/blogs.n1zyy.com\/n1zyy\/2007\/06\/17\/security\/","title":{"rendered":"Security"},"content":{"rendered":"<p>In the world of cryptography, people hate the concept of <a href=\"http:\/\/en.wikipedia.org\/wiki\/Security_through_obscurity\">security through obscurity<\/a><\/p>\n<p>In a nutshell, they argue that using a &#8216;secret&#8217; means of securing something is no good. On some level, they have a valid argument. On another level, it&#8217;s more of a zealous ideal that doesn&#8217;t make any sense in the real world.<\/p>\n<p>I&#8217;ve always preferred a more pragmatic approach: security through obscurity is a great way to buttress an already-secure system. If your non-obscurity approach (&#8220;security by design&#8221;) is complete rubbish, security through obscurity is only as good as your obscurity.<\/p>\n<p>The government used a mode of encryption called Fascinator. You sometimes see radios with Fascinator encryption modules for sale on eBay. It&#8217;s very, very illegal to own Fascinator equipment, because it&#8217;s somewhat of a classified mode of encryption. Not much is known about how it works. Isn&#8217;t that security by obscurity?<\/p>\n<p>Here&#8217;s a more simple argument: a business keeps its money in a safe. The safe is somewhat secure: you need the combination to open it, and you can&#8217;t really pick it. On the other hand, a stick of dynamite will also open it. I&#8217;m hardly a safe expert, but many businesses, at least in fiction and the olden days, kept their safes in pretty prominent locations, and, if not that, in easy-to-guess observations. If I visit an establishment a few times a week, I might become very familiar with where they keep their safe. If I decided to rob them, all I&#8217;d need was some dynamite.<\/p>\n<p>But now suppose that the business is owned by someone who thinks outside the box a little, and who places the safe somewhere bizarre: say, the employee restroom, or in a restaurant&#8217;s kitchen. Those who visit the business probably won&#8217;t even <em>know<\/em> that there&#8217;s a safe, so someone who&#8217;s planning on some safe heists might not even bother with their business.<\/p>\n<p>The argument against security through obscurity is that, if someone knew where the safe was kept&#8211;an employee, perhaps&#8211;would be able to get to it with no additional effort. And this is a valid point, but it misses what I think is the more important point: if you used it <em>with<\/em> a &#8220;secure by design&#8221; system (e.g., the safe), it&#8217;s far less likely that people would even know about it in order to break it.<\/p>\n<p>In a computer setting, I thought about (but haven&#8217;t taken the time to accomplish) running sshd on a nonstandard port. sshd is a very secure protocol and I use strong passwords. But running it on a nonstandard port: hiding it: security through obscurity would provide me with an additional layer of protection.<\/p>\n<p>In the past, I had an interface to directly manipulate the blog comments table, allowing mass deletion easily. It was something I hacked together one night, and never bothered password-protecting it. It was a &#8216;hidden URL&#8217; with no links, and the URL was just a random, meaningless word. <em>This<\/em> is what the security through obscurity folks rightly condemn: anyone who looked through my browser history, or who guessed the URL (very unlikely?) would have been able to do serious damage to the database. But I was the only one who ever knew it existed, and the logs confirm that I was the only one who ever accessed it. Of course it&#8217;s a bad idea, and I agree that security through obscurity, as the <em>only<\/em> means of defense, is a horrible idea. (Despite it having worked perfectly for me.)<\/p>\n<p>But I can&#8217;t <em>stand<\/em> when people go against anything that includes security through obscurity in any sort. It can only help, just don&#8217;t rely on it exclusively.<\/p>","protected":false},"excerpt":{"rendered":"<p>In the world of cryptography, people hate the concept of security through obscurity In a nutshell, they argue that using a &#8216;secret&#8217; means of securing something is no good. On some level, they have a valid argument. On another level, &hellip; <a href=\"https:\/\/blogs.n1zyy.com\/n1zyy\/2007\/06\/17\/security\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,27],"tags":[],"class_list":["post-7","post","type-post","status-publish","format-standard","hentry","category-computers","category-security"],"_links":{"self":[{"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/posts\/7","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/comments?post=7"}],"version-history":[{"count":0,"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/posts\/7\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/media?parent=7"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/categories?post=7"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.n1zyy.com\/n1zyy\/wp-json\/wp\/v2\/tags?post=7"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}