this post was submitted on 02 Nov 2025
140 points (99.3% liked)
Opensource
5621 readers
103 users here now
A community for discussion about open source software! Ask questions, share knowledge, share news, or post interesting stuff related to it!
⠀
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Sorry but that's not how computing best practices and computer security work. We're far beyond "security through obscurity". Security now works on encryption schemes which are highly publicized and vetted by multiple parties. That goes in combination with protecting through policy like access controls, endpoint protection and monitoring, and security training.