frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

Security Through Obscurity Is Not Bad

https://mobeigi.com/blog/security/security-through-obscurity-is-not-bad/
21•mobeigi•1h ago

Comments

Bender•1h ago
Security through obscurity is NOT bad.

Security ONLY through obscurity is bad (Kerckhoffs's Principle).

Security through obscurity, as an additional layer, is good!

I've been saying this ever since that phrase was coined. A layer or two of obscurity keeps a lot of noise out of logs, reduces alert fatigue and cuts down on storage costs especially if one is using Splunk as their SIEM and makes targeted attacks much easier to detect. I will keep it.

mobeigi•41m ago
Couldn't agree more, I have personally benefited from the additional layer and it irks me when people outright claim it has no value.
ithkuil•24m ago
The informed claim is not that the obscurity layer has no value. Quite the contrary, it has such a great value that it basically reduces the incentives to have great proper security and thus once the obscurity layer is breached the second line of defense is weaker.

The argument is that it's much easier to secure proper key material rather than design and config information that can often be leaked accidentally because it's actually directly manipulated by humans (employee onboarding, employee churn etc)

kstrauser•18m ago
That's an interesting way to describe it. It's kind of like the turn away from requiring regular password updates. On paper, password rotation is good. But when you consider its interaction with human psychology, the policy makes security worse by causing people to make bad decisions.
rcleveng•22m ago
This sounds just like my thoughts on PostgreSQL's row level security. As a additional layer it's good, as the only thing, watch out!
bee_rider•44s ago
It would be nice if there was no overlap between terms for the operational things that help improve security (log reduction and other non-cryptographic methods of reducing admin fatigue), and the mathematical cryptographic characteristics of the system.

If the focus is on the latter, obscurity buys you nothing and adds complexity/distraction, which is bad. The former can be important though.

shivasurya•20m ago
It's surprising to me why this take is trending on HN.
INTPenis•20m ago
I've been saying for years, it's one layer of security. That's undeniable.
Latty•15m ago
I'll push back on this: obscurity isn't a "free" layer of security, it has both security benefits and security costs.

By having obscurity you lose anther layer of security: public scrutiny. It's harder for security issues to remain if people can see them and point them out, more eyes mean more chances to catch problems.

There is also a cultural component: having to lay out what you are doing publicly means you can't just think "no one will know", and let something slide, which pushes you towards better security practices.

Of course, this doesn't mean obscurity is always going to be the worse choice, there are times it will offer more than it costs and it's particularly evident that in, for example, open source projects, a lot of the time the number of eyes on most code is low enough that "many eyes" is a bit misleading, but I think presenting it as a pure positive is wrong, obscurity has cost, even if you think it's worth it in some cases.

catoc•19m ago
“Security through obscurity” has the connotation that it is the obscurity that achieves the security - which is bad.

”Security including obscurity“ is fine.

justonceokay•16m ago
Yes it’s not that it’s bad, it just means you aren’t done yet
fortran77•15m ago
Wordpress is a great example. He cites

> There is a long-standing security recommendation to change WordPress's default database table prefix to a random one. For example, wp_users becomes wp_8df7b8_users. This is often dismissed as "worthless" because it is security through obscurity.

I found that just changing the default URL for the wordpress login from the usual wp-admin to anything reduces by several orders of magnitude the number of scripts that try your site for the most common vulnerabilities---something that happens constantly for any site on the web, once a minute or so.

pants2•6m ago
Nice. If you do the opposite of what WordPress does for security you're probably on the right track.
i_think_so•1m ago
Same thing as changing your ssh port to something random. It's a trade-off with the convenience of knowing that all of your servers are listening on port 22 and you won't need any customizations in scripts or whatnot. But there are ways to mitigate much of that.

On the benefit side, mitigating most of the computational load, log analysis load, how much are the baddies poking me while I sleep load, etc...all of these together make changing such defaults a slam dunk IMO.

thephyber•8m ago
> Security ONLY through obscurity is bad (Kerckhoffs's Principle).

This is the crux of the article.

(1) Kerckhoffs's Principle doesn’t say that. It says to design the system AS IF the adversary has all of the info about it except the secrets (encryption key, certificates, etc).

(2) this rule is okay if you are a solo maintainer of a WordPress installation. It’s a problem if you work at a large company and part of the company knows the full intent of this, while the rest of the company doesn’t know the other layers of security BECAUSE of the obscurity layer. In this way, it’s important to communicate that this is only a layer and shouldn’t replace any other security decisions.

caminante•7m ago
Regarding Counterstrike (game) example, there were already a lot of cheaters and a cheater ecosystem that still exists to this day. I suspect Valve could address it if it wanted to, but the gameplay/development cost trade-offs aren't enough.

Valve pivoted to server-side anti-cheat and toleration because someone probably did the math on max(profit) with lootboxes.

perching_aix•4m ago
Cryptography is "just" a mathematically sophisticated version of manufacturing obscurity, so that's missing the point a bit. That quote is about all the other forms of manufactured obscurity not being anywhere near as rigorous, which should be obvious.
AshamedCaptain•1m ago
The problem with this argument is that you can justify an infinite amount of crap with it, the security equivalent of cockroach papers; which inevitably people ends up treating as real security.

One example I remember is Pidgin storing its passwords in plain text in $HOME. They could have encrypted them with some hardcoded string, and made a lot of people happy that they would no longer grep their $HOME and find their passwords right there. However this had the side effect that now people were dropping the ball and sharing their config files with others.

In addition, these layers of obscurity are also not overhead free. E.g. they may complicate debugging. They may introduce dangerous dependencies. Etc. etc.

Ghost Operators: How Israeli Telecoms Were Exploited to Track Citizens Worldwide

https://www.haaretz.com/israel-news/security-aviation/2026-05-03/ty-article-magazine/ghost-operat...
1•miohtama•1m ago•0 comments

OSM-FR Panoramax server "only for testing if outside of France"

https://community.openstreetmap.org/t/osm-fr-panoramax-server-only-for-testing-if-outside-of-fran...
1•marklit•1m ago•0 comments

Can Investors Trust AI Sales Figures?

https://www.wsj.com/opinion/can-investors-trust-ai-sales-figures-c60c46bf
1•ericlamb89•3m ago•1 comments

Viewstamped Replication (1988) [pdf]

https://www.cs.princeton.edu/courses/archive/fall09/cos518/papers/viewstamped.pdf
1•tosh•3m ago•0 comments

DigiCert: Misissued Code Signing Certificates

https://bugzilla.mozilla.org/show_bug.cgi?id=2033170
1•baal80spam•4m ago•0 comments

Container Is Not a Sandbox

https://emirb.github.io/blog/microvm-2026/
1•xngbuilds•5m ago•0 comments

China became addicted to its tobacco monopoly

https://www.theexamination.org/articles/how-china-became-addicted-to-its-tobacco-monopoly
2•Teever•8m ago•0 comments

Spirit pilot gets overwhelming sendoff from rivals after final flight cancelled

https://www.theguardian.com/world/2026/may/03/spirit-pilot-send-off-from-southwest
1•cf100clunk•11m ago•0 comments

Screw You Realtek

https://www.growse.com/2026/05/02/screw-you-realtek.html
2•birdculture•13m ago•0 comments

On AI-Created Art: An Interview with Adam Clegg

https://micahblachman.beehiiv.com/p/on-ai-created-art-an-interview-with-adam-clegg
1•subdomain•14m ago•0 comments

Writing Better – Julian Shapiro

https://www.julian.com/guide/write/intro
1•eigenBasis•14m ago•0 comments

Looking for advice on reaching low-tech B2B users (craftsmen)

https://news.ycombinator.com/ask
1•FelixLepi•14m ago•1 comments

AI chatbot fraud: the 'gift card' subcription that may cost you dear

https://www.theguardian.com/money/2026/may/03/ai-claude-chatbot-gift-card-subcription-scam-myster...
1•Brajeshwar•14m ago•0 comments

Lines or Less: Test Case Minimization

https://matklad.github.io/2026/04/20/test-case-minimization.html
1•swq115•17m ago•0 comments

Looking for advice on reaching low-tech B2B users (craftsmen)

1•FelixLepi•17m ago•0 comments

Show HN: A 4-year-old "TurboQuant" implementation

https://github.com/amitport/EDEN-Distributed-Mean-Estimation
2•amitport•18m ago•0 comments

Hindu Perspectives on Free Will

https://worthypatterns.substack.com/p/the-soul-of-the-world
1•A-K•18m ago•0 comments

For thirty years I programmed with Phish on, every day

https://christophermeiklejohn.com/ai/personal/phish/flow/agents/2026/05/03/rift.html
4•azhenley•21m ago•0 comments

Ask HN: Is it possible to get hired as an African software engineer

3•vixalien•22m ago•1 comments

Year old Nepali and unemployed, any advice for me?

1•shivajikobardan•23m ago•0 comments

Real inbox deserves better Temp emails with full API access and webhooks

https://openinbox.io/
1•devnplay•24m ago•0 comments

Finding Structurally Duplicate Go Functions with AST Hashing

https://medium.com/@mailbox.sq7/finding-structurally-duplicate-go-functions-with-ast-hashing-529e...
1•alzhi7•24m ago•1 comments

Sam Altman talks with Mark Zuckerberg about how to build the future [video]

https://www.youtube.com/watch?v=Lb4IcGF5iTQ
1•chistev•24m ago•1 comments

Testing macOS on the Apple Network Server 2.0 ROMs

http://oldvcr.blogspot.com/2026/05/testing-macos-on-apple-network-server.html
2•zdw•27m ago•0 comments

Salad Oil Scandal

https://en.wikipedia.org/wiki/Salad_oil_scandal
2•azeemba•28m ago•0 comments

The Sour Cat Jailbreak: just be open of what you want

https://claude.ai/share/71cd0982-fa52-4b65-844d-68560cc43b36
2•pshirshov•28m ago•1 comments

Recreating the Smells of History

https://knowablemagazine.org/content/article/society/2026/recreating-the-smells-of-the-past
2•bookofjoe•29m ago•0 comments

Do you think AI Agents need an identity?

1•DannyHeng•30m ago•1 comments

SmartTune CLI – APM/BF/PX4 Log Analysis for AI Agents

https://github.com/raylanlin/smarttune-cli
1•RaylanLIN•34m ago•0 comments

Running OpenClaw on Amazon EC2 with Claude and Telegram

https://blog.harun.dev/running-openclaw-on-amazon-ec2-with-claude-and-telegram
2•mooreds•36m ago•0 comments