this post was submitted on 07 Aug 2023
258 points (95.7% liked)

linuxmemes

21311 readers
396 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack members of the community for any reason.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • These rules are somewhat loosened when the subject is a public figure. Still, do not attack their person or incite harrassment.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn. Even if you watch it on a Linux machine.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, and wants to interject for a moment. You can stop now.
  •  

    Please report posts and comments that break these rules!


    Important: never execute code or follow advice that you don't understand or can't verify, especially here. The word of the day is credibility. This is a meme community -- even the most helpful comments might just be shitposts that can damage your system. Be aware, be smart, don't fork-bomb your computer.

    founded 1 year ago
    MODERATORS
     
    you are viewing a single comment's thread
    view the rest of the comments
    [–] bastian_5@sh.itjust.works 9 points 1 year ago (2 children)

    Technically all security is only possible through obscurity. If everyone had your private key, it would no longer be secure because it is no longer obscure.

    [–] Dark_Arc@lemmy.world 11 points 1 year ago (1 children)

    That's not what this means at all. Security by obscurity is referencing software that itself has secret pieces that are (to the software authors) "security features" which are only secure so long as their implementation details remain secret.

    Software using a key is not security by obscurity, knowing that a key is used by the software does not result in the application being compromised.

    Software that uses one secret key for all users embedded in the binary is security by obscurity.

    [–] bastian_5@sh.itjust.works 2 points 1 year ago

    I thought it was referring to something being secure because few people are using it, so nobody is targeting it.