this post was submitted on 02 Nov 2025
149 points (100.0% liked)
Opensource
4354 readers
235 users here now
A community for discussion about open source software! Ask questions, share knowledge, share news, or post interesting stuff related to it!
⠀
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Sorry but that's not how computing best practices and computer security work. We're far beyond "security through obscurity". Security now works on encryption schemes which are highly publicized and vetted by multiple parties. That goes in combination with protecting through policy like access controls, endpoint protection and monitoring, and security training.