We are independent & ad-supported. We may earn a commission for purchases made through our links.

Advertiser Disclosure

Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.

How We Make Money

We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently from our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.

What Is Security through Obscurity?

Jessica Ellis
By
Updated May 16, 2024
Our promise to you
EasyTechJunkie is dedicated to creating trustworthy, high-quality content that always prioritizes transparency, integrity, and inclusivity above all else. Our ensure that our content creation and review process includes rigorous fact-checking, evidence-based, and continual updates to ensure accuracy and reliability.

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

Editorial Standards

At EasyTechJunkie, we are committed to creating content that you can trust. Our editorial process is designed to ensure that every piece of content we publish is accurate, reliable, and informative.

Our team of experienced writers and editors follows a strict set of guidelines to ensure the highest quality content. We conduct thorough research, fact-check all information, and rely on credible sources to back up our claims. Our content is reviewed by subject matter experts to ensure accuracy and clarity.

We believe in transparency and maintain editorial independence from our advertisers. Our team does not receive direct compensation from advertisers, allowing us to create unbiased content that prioritizes your interests.

Security through obscurity is a philosophy that suggests obfuscation and secrecy as a primary means of ensuring system or information security. The underlying assumption is that if only a few trusted people understand the workings of a security system, the system is generally simple. Some methods commonly used for security through obscurity include encoding data or creating proprietary information through copyright protection. Some experts suggest, however, that this method is simply an illusion, and may actually render computer programs and systems more vulnerable to hackers.

The basic principle of security through obscurity is quite simple: if data is kept secret, no one outside the protection of the secret can find it. Somewhat akin to hiding money under a mattress, this concept works admirably as long as no untrustworthy adversaries know that the money is in the mattress. Using techniques that obscure data, or allowing only cleared individuals to access coding or security algorithms can help protect the knowledge from becoming public, and thus open to defeat.

Some of the methods used for security through obscurity include disguising data. For instance, if a file is named “company passwords,” it is vulnerable to easy attacks. Changing file names to innocuous or coded terms may help add a small measure of security. Similar methods may include the use of obfuscated code, which disguises protected information by encoding it in an unusual format. One common method includes hiding the fact that a computer or server even exists, allowing only designated users to access it. Since the existence of the computer is unknown, it is generally hoped that a hacker will not know to look for it.

Proprietary techniques are common means of protecting software and operating systems through obscurity. By legally and practically limiting access to program data to designated individuals, some software developers hope to deter hackers and frighten off any person who tries to expose security information. In some cases, a user may legitimately discover a security flaw and ask the company to provide a patch, only to receive threats of legal action should he or she expose the flaw to the public. In this way, a developer may be able to keep knowledge of security flaws from spreading, thus providing some means of protection. Workers entrusted with security information may also have to sign non-disclosure agreements, which can legally forbid them to release security information even after leaving a job.

While security through obscurity may be useful as part of an overall security system, on its own, it may lead to staggering vulnerabilities. Using basic obscurity methods, such as file and user name protection, may work best when in conjunction with methods such as password protection and strong firewalls. Some computer experts also tout the value of transparent security, suggesting that a strong security system that is completely open to users means that weaknesses will be quickly detected and guarded against.

EasyTechJunkie is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.
Jessica Ellis
By Jessica Ellis , Writer
With a B.A. in theater from UCLA and a graduate degree in screenwriting from the American Film Institute, Jessica Ellis brings a unique perspective to her work as a writer for EasyTechJunkie. While passionate about drama and film, Jessica enjoys learning and writing about a wide range of topics, creating content that is both informative and engaging for readers.

Discussion Comments

Jessica Ellis

Jessica Ellis

Writer

With a B.A. in theater from UCLA and a graduate degree in screenwriting from the American Film Institute, Jessica Ellis...
Learn more
EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.

EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.