

That’s when your house becomes vulnerable. The principle is simple: your house will be “secure” until a thief discovers the key in its hiding place. Hiding the key to your front door under a nearby rock or the welcome mat. And the first example that comes to mind is this one: To explain how security by obscurity works, we need to look at real-life examples. By using security by obscurity, some people think they are going to minimize the risk of getting targeted by an attack.

STO is based primarily on hiding important information and enforcing secrecy as the main security technique.
#SECURITY BY OBSCURITY SOFTWARE#
Known also as “STO,” “security by obscurity” or simply as “secrecy,” it’s one of the ways systems engineers and software developers secure a system or an app. What is security through obscurity? (STO) We know this topic opens a lot of discussions within the infosec community, and that’s exactly why we’re writing about it-to answer questions and demystify the doubts that constantly surround this topic. One thing that isn’t always mandatory is applying security through obscurity. When you work as a system administrator, one of your main tasks is to keep your systems secure, and that includes applying system package updates, kernel patching, disabling unnecessary services, installing IDs and firewalls, and many other things. How much critical data is really hidden in your online infrastructure?.Is security through obscurity a bad thing?.What is security through obscurity? (STO).
