Security through obscurity is not bad
What “security through obscurity” means (and semantic fights)
- Many distinguish between:
- “Security through obscurity” = security depends on hidden details → widely viewed as bad.
- “Security including obscurity” = hidden details as one layer among others → mostly seen as fine.
- Others argue the term is misleading: all security hides something (keys, passwords), so the phrase should be reserved for “relying on hidden mechanisms instead of robust controls.”
- Kerckhoffs’s principle is frequently cited: design systems assuming the adversary knows everything except the secret keys.
Arguments that obscurity adds value
- Reduces automated, low-skill attacks and log noise (e.g., moving SSH off port 22, changing WordPress login URL or table prefixes).
- Higher signal-to-noise ratio can make real anomalies more detectable and reduce admin fatigue and SIEM cost.
- Increases attacker effort for mass exploitation; opportunistic attackers may move on to easier targets.
- Viewed as part of “defense in depth,” like hiding a safe behind a painting when the lock is already strong.
- Examples cited: port knocking, JS obfuscation, CAPTCHAs, proprietary anti-cheat systems, randomized DB prefixes.
Arguments that obscurity is dangerous or overrated
- Can create complacency: implementers stop short of “real” security (patching, auth, whitelisting).
- Reduces public scrutiny; hidden designs may harbor flaws that never get reviewed.
- Often provides trivial brute-force resistance (e.g., 16‑bit port space) compared to cryptographic keys.
- Adds complexity, debugging pain, vendor lock-in, and operational overhead, especially in large organizations.
- Some measures only “reduce noise” but do not materially improve security posture, yet get treated as if they do.
Examples and edge debates
- SSH on nonstandard ports:
- Pro: massive drop in random scans, easier monitoring.
- Con: no intrinsic protection of SSH itself; IP whitelisting or VPNs considered stronger.
- WordPress table prefix/login URL:
- Pro: blocked commodity exploit scripts during a real plugin vuln.
- Con: still not a substitute for patching and proper hardening.
- ASLR and cryptography: disputed whether they count as “obscurity”; many emphasize they remain secure even when fully understood, because the keys, not the algorithms, are secret.
AI and changing threat models
- Some claim AI makes de‑obfuscation cheap, eroding obscurity’s value.
- Others respond that AI also raises defenders’ capabilities and that raising attacker “token costs” still matters.