Tom Ritchford
Apr 25, 2021

--

Thanks, I figured it was something like that, but it was written as if everyone used just that technology.

Yes indeed, the "secrecy through obscurity" thing is generally bogus and in this article, it's particularly bogus. (I mean, some level of obscurity is necessary - you need to hide your secrets and your SSH/GPG keys.)

--

--

No responses yet