Hacker News new | past | comments | ask | show | jobs | submit login

You can usefully distinguish between the name/location/identity of the resource and credentials/password used to access it. "Security through obscurity" is a specific criticism that usually means that the system doesn't adhere to Kerckhoffs's principle.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: