| ← Older revision | Revision as of 07:00, 28 August 2011 |
| Line 8: | Line 8: |
| | {{en-noun|sg=[[security]] [[through]] [[obscurity]]|-}} | | {{en-noun|sg=[[security]] [[through]] [[obscurity]]|-}} |
| | | | |
| - | #{{context|security|computing}} Relying on an [[adversary]]'s lack of [[knowledge]] to provide [[security]]. | + | #{{context|security|computing}} Relying on a potential [[attacker]]'s lack of [[knowledge]] as a means of [[security]]. |
| | #*{{quote-book|1990||title=The Evolution of turnin A Classroom Oriented File Exchange Service|author=W Cattey|publisher=USENIX Summer Conference | | #*{{quote-book|1990||title=The Evolution of turnin A Classroom Oriented File Exchange Service|author=W Cattey|publisher=USENIX Summer Conference |
| | |passage=This security through obscurity proved adequate for our prototype, but it was unacceptable for a ''turnin'' service in wide use.}} | | |passage=This security through obscurity proved adequate for our prototype, but it was unacceptable for a ''turnin'' service in wide use.}} |