Misplaced Pages

Talk:Security through obscurity: Difference between revisions

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Browse history interactively← Previous editContent deleted Content addedVisualWikitext
Revision as of 01:42, 6 August 2005 editMBisanz (talk | contribs)Extended confirmed users126,668 editsNo edit summary← Previous edit Latest revision as of 01:12, 30 September 2024 edit undoClueBot III (talk | contribs)Bots1,375,731 editsm Archiving 1 discussion to Talk:Security through obscurity/Archive 1. (BOT) 
(117 intermediate revisions by 61 users not shown)
Line 1: Line 1:
{{WikiProject banner shell|class=C|vital=yes|1=
==POV in article==
{{WikiProject Computer Security|importance=Mid}}

{{WikiProject Computing|importance=}}
* It is important to separate ''description'' of the practice of security through obscurity with ''criticism'' of it.
}}

{{User:ClueBot III/ArchiveThis
----
|archiveprefix=Talk:Security through obscurity/Archive

|format= %%i
:''Operators of systems that rely on security by obscurity often keep the fact that their system is broken secret, so as not to destroy confidence in their service or product.''
|age=2160

|maxarchsize=150000
That seems POV to me.
|numberstart=1

|archivebox=yes
Also, the beginning of the article says that it's a controversial security practice. I thought that it was a pejorative term, and that people who actually practive it call it something else. -- ] 07:52, Nov 20, 2003 (UTC)
|box-advert=yes
:Sorry to notice this comment so tardily. The problem noted seems to center around the meaning of 'broken'. Since a cryptosystem is designed to provide security (whichever aspect(s) is the design intent), if it fails to do so, it's broken by the only relevant test -- failure to do as intended. In engineering, an engine breaks when it doesn't work any more; same thing here, in principle. That I don't know about details of the security breach is, I think, irrelevant. You might, and so learn what was to have been securely held, even if he and I remain in pathetic ignorance.
}}

:Thus, I would argue there is no POV around broken in the sentence quoted. ] 15:32, 12 May 2004 (UTC)

==security of meaning through obscurity of phrase successful!==

I give up. What is meant here by 'their gain'? ''from article''

''specifically, many forms of cryptography are so widely known that preventing their gain by a national government would likely be impossible; the RSA algorithm has actually been memorized in detail by most graduating computer science students.''

] 15:21, 12 May 2004 (UTC)

: Maybe ''specifically, many algorithms are so widely known that preventing any national government from learning them would likely be impossible; the RSA algorithm has actually been memorized in detail by most graduating computer science students.'' ? ] 15:26, 12 May 2004 (UTC)
::Matt, Could be, but this is still seriously incoherent. Needs rephrasing. ] 15:31, 12 May 2004 (UTC)
::: Yes, it's poorly worded currently. ] 15:35, 12 May 2004 (UTC)
:::: What about "(they did not change a thing)", that seems a little pointed, maybe something like "Which was not successful" ] 01:42, August 6, 2005 (UTC)

==steganography==
In looking at the text on the "useless" DMCA, I sense some straying from the topic of this article. I think the point is that systems should use good security rather than just obscurity.
Going down the slippery slope to argue about legal and legislative tactics leads to a whole
bunch of stuff that dilutes the value of the article, I fear.

Furthermore, I think we need some text on cases where obscurity is in fact good engineering practice - i.e. ]. And that article needs to refer to this one.... --] 21:05, 2004 Jul 19 (UTC)

: I think it's fine to mention the DMCA because it's an example of how legislation is used (or is claimed to be used...) to enforce the obscurity of exploits ("security through obscurity") — perfectly on-topic as far as I can see. I agree, however, that the article needs some balance in its treatment; security through obscurity isn't universally bad. Most people running Linux are far safer from attack on the Internet than people running Windows; why? a big component is that Linux is ''obscure'', so there are less viruses, worms and script-kiddies out there that target Linux (and yes, Linux arguably has better intrinsic security). ] 02:19, 20 Jul 2004 (UTC)
::The problem with this is that the "obscurity" here is actually more related to confusion about the secret. Cryptographers understand that the secret in a system should be as simple as possible, because this means that you can change it easily, and also that you can study it carefully. So, for example, a users password should be the secret, not their login name. Passwords are easy to change, login names not as easy. When we discuss "obscurity" of OS's (meaning Linux vs. Windows), this is not the same kind of obscurity. In fact, in this context Linux is less obscure, because anyone who wants to can see exactly how each part of the system works. In Windows, the secret is (for example) not only your password, but the software that takes your password and uses it.
::Matt, I would reverse your phrasing. Linux is not arguably more secure than Windows (modulo incompetent configuration), it '''is''' so. Having administered both in production environments, my experience is that there is little room for argument on this. Not if you go by the relative amount of effort (and success or lack thereof) in 'securing' them. And it is only arguably due to Linux' relative obscurity -- same reasoning. Linux source is published for all, after all. This is hardly obscurity!!! Incompetence of attacker is not even remotely comparable to attempted intentional obscurity of design.
::As for balance in the article, I think that it's tough to argue that s thru o is sensible in the case of steag while not defensible in the case of poor crypto design. It's an apples and oranges thing. Steag is not design obscurity that some folks are hoping won't be discovered which when lost will allow a successful attack, it's deliberate obsfucation of information upon which depends confidentiality. Not commensurate concepts, really. Comments? Anyone? ] 14:59, 20 Jul 2004 (UTC)

== "Advantages and disadvantages of security by obscurity" ==

That section contains no "Advantages".. Shouldn't this be re-worded?

Latest revision as of 01:12, 30 September 2024

This  level-5 vital article is rated C-class on Misplaced Pages's content assessment scale.
It is of interest to the following WikiProjects:
WikiProject iconComputer Security: Computing Mid‑importance
WikiProject iconThis article is within the scope of WikiProject Computer Security, a collaborative effort to improve the coverage of computer security on Misplaced Pages. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.Computer SecurityWikipedia:WikiProject Computer SecurityTemplate:WikiProject Computer SecurityComputer Security
MidThis article has been rated as Mid-importance on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computing (assessed as Mid-importance).
Things you can help WikiProject Computer Security with:
Article alerts will be generated shortly by AAlertBot. Please allow some days for processing. More information...
  • Review importance and quality of existing articles
  • Identify categories related to Computer Security
  • Tag related articles
  • Identify articles for creation (see also: Article requests)
  • Identify articles for improvement
  • Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
  • Find editors who have shown interest in this subject and ask them to take a look here.
WikiProject iconComputing
WikiProject iconThis article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Misplaced Pages. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.ComputingWikipedia:WikiProject ComputingTemplate:WikiProject ComputingComputing
???This article has not yet received a rating on the project's importance scale.

Archives (Index)



This page is archived by ClueBot III.
Categories: