create account

Security Through Obscurity ... and Why It Isn't by netuoso

View this thread on: hive.blogpeakd.comecency.com
· @netuoso ·
$8.51
Security Through Obscurity ... and Why It Isn't
![security-fingerprint.jpg](https://steemitimages.com/DQmUfpFMMqCaUF87RB9qSAM59rXfMM9nnNJ8hUJBJv3xnmF/security-fingerprint.jpg)

# Security Through Obscurity .. and Why It Isn't
Lately, I have been seeing a lot of people discussing system and network administration as it relates to setting up STEEM nodes or Witness servers. Something that keeps cropping up, is how to keep the server secure from hackers or outside abuse. One of the number one things that people suggest, is to change the SSH port from the default of 22 to something else.

Today, I want to discuss the difference between **security through obscurity** and **security through secrecy**. 

## Lets' dive right in
Security through obscurity is defined as **reliance on the secrecy of the design or implementation as the main method of providing security for a system or component of a system**.

Security through secrecy is defined as **reliance on the measurability of the probability a security measure can be broken.**

## Security Through Obscurity
Some examples of this practice are:
- Hiding a key under a rock near a locked door
- Changing default ports to non-default ports
- Wearing a baseball cap and sunglasses to avoid facial recognition
- Changing the color of a car to run from the police

As you can tell, some of these examples might actually work to keep a secret hidden for some time. However, relying on only one method of security is sure to fail.

## Security Through Secrecy
Some example of this practice are:
- A passphrase that uses a high amount of entropy
- A hidden code language that you created
- A combination lock on a briefcase

Again, as you can tell, some of these examples will provide a high level of security. However, they can often still be broken. The passphrase might not be complex enough, the code language not unique enough, or the combination lock can be brute forced given enough time.

Despite the fact that we realize these security mechanisms can be broken, we can often figure out exactly how much time, effort, and money would be required to perform such a feat.

![security-keywords.jpg](https://steemitimages.com/DQmXHnWTZnarxVNrjUpGpFxrbFKsjGg6Nfhdsx5J9JYr1AL/security-keywords.jpg)

## Cost Examples
With current technology, a 512-bit RSA key can be broken in around 3 hours for about $70. And the guides that are available make this very doable for the average netizen. Once you start raising the entropy, you start getting into the realm of an attack that would take hundreds, thousands, or even millions of years to complete. Despite the fact that it is eventually breakable, the cost and effort is insurmountable, therefore making the attack implausible.

A combination padlock might take only a few hours for an attacker to crack open. Usually, this level of security is enough for people traveling with a briefcase or suitcase for a short while. There is no need to have security capable of protecting the bags contents indefinitely unless it is the President's Nuclear Football.

## So I shouldn't do security through obscurity?
Wrong. You should have multiple layers of security in any situation where you need to protect something from unwanted access. Your security plan should be like an onion; having many layers. You should expect that a determined attacked will eventually break through anything you have in place. Multiple layers of security give you enough time to be able to react to their unwarranted attempts at access.

## Other Options
Other method and tips exist to increase the cost and effort required to break security measures. Things such as banning IP addresses that make too many failed login attempts, or throttling connections so brute forcers are unable to try so many logins.

## Closing Notes
Despite taking every possible security measure you can think of, someone will always be able to find a weak point in your system. There will always be a way in that you did not think to seal. With this logic in mind, you should try to implement as many mechanisms as you can including logging, alerting, backups, and firewalls. Don't rely on keeping things secret from the enemy. Worry about making it financially impossible for them to break through your known security implementation.

# The reliance of a secret remaining secret means it won't.
👍  , , , , , , , , , , , , , , , , , , , , ,
properties (23)
authornetuoso
permlinksecurity-through-obscurity-and-why-it-isn-t
categorysecurity
json_metadata{"tags":["security","programming","steem-dev","steemit","devops"],"image":["https://steemitimages.com/DQmUfpFMMqCaUF87RB9qSAM59rXfMM9nnNJ8hUJBJv3xnmF/security-fingerprint.jpg","https://steemitimages.com/DQmXHnWTZnarxVNrjUpGpFxrbFKsjGg6Nfhdsx5J9JYr1AL/security-keywords.jpg"],"app":"steemit/0.1","format":"markdown"}
created2017-08-05 03:09:15
last_update2017-08-05 03:09:15
depth0
children6
last_payout2017-08-12 03:09:15
cashout_time1969-12-31 23:59:59
total_payout_value7.936 HBD
curator_payout_value0.570 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length4,296
author_reputation151,901,967,807,285
root_title"Security Through Obscurity ... and Why It Isn't"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd0
post_id10,811,923
net_rshares2,137,374,295,495
author_curate_reward""
vote details (22)
@azissuloh ·
thank you for sharing @neutuso
glad to see this article
properties (22)
authorazissuloh
permlinkre-netuoso-security-through-obscurity-and-why-it-isn-t-20170805t031238743z
categorysecurity
json_metadata{"tags":["security"],"users":["neutuso"],"app":"steemit/0.1"}
created2017-08-05 03:12:36
last_update2017-08-05 03:12:36
depth1
children0
last_payout2017-08-12 03:12:36
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length55
author_reputation6,978,132,461,726
root_title"Security Through Obscurity ... and Why It Isn't"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id10,812,111
net_rshares0
@bukharisulaiman ·
My greetings from aceh @bukharisulaiman. I am a newcomer in steemit. Information and experience from friends is very useful to me. Please guide me @netuoso
properties (22)
authorbukharisulaiman
permlinkre-netuoso-security-through-obscurity-and-why-it-isn-t-20170805t061348469z
categorysecurity
json_metadata{"tags":["security"],"users":["bukharisulaiman","netuoso"],"app":"steemit/0.1"}
created2017-08-05 06:13:48
last_update2017-08-05 06:13:48
depth1
children0
last_payout2017-08-12 06:13:48
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length155
author_reputation3,201,697,376,144
root_title"Security Through Obscurity ... and Why It Isn't"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id10,822,854
net_rshares0
@realitycheck ·
This might be as important as placing a band aid over your laptop camera.
***Wearing a baseball cap and sunglasses to avoid facial recognition***
properties (22)
authorrealitycheck
permlinkre-netuoso-security-through-obscurity-and-why-it-isn-t-20170805t031832023z
categorysecurity
json_metadata{"tags":["security"],"app":"steemit/0.1"}
created2017-08-05 03:18:33
last_update2017-08-05 03:18:33
depth1
children2
last_payout2017-08-12 03:18:33
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length145
author_reputation358,607,262,440
root_title"Security Through Obscurity ... and Why It Isn't"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id10,812,475
net_rshares0
@netuoso ·
![](https://steemitimages.com/DQmZa32hFTWP3GWRze7HDvC4cphawxhC9gw4LMZnbmy9M6b/image.png)

Even smart people rely on silly methods for "security".
properties (22)
authornetuoso
permlinkre-realitycheck-re-netuoso-security-through-obscurity-and-why-it-isn-t-20170805t033219167z
categorysecurity
json_metadata{"tags":["security"],"image":["https://steemitimages.com/DQmZa32hFTWP3GWRze7HDvC4cphawxhC9gw4LMZnbmy9M6b/image.png"],"app":"steemit/0.1"}
created2017-08-05 03:32:18
last_update2017-08-05 03:32:18
depth2
children1
last_payout2017-08-12 03:32:18
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length145
author_reputation151,901,967,807,285
root_title"Security Through Obscurity ... and Why It Isn't"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id10,813,245
net_rshares0
@realitycheck ·
Appears so!
properties (22)
authorrealitycheck
permlinkre-netuoso-re-realitycheck-re-netuoso-security-through-obscurity-and-why-it-isn-t-20170805t040238260z
categorysecurity
json_metadata{"tags":["security"],"app":"steemit/0.1"}
created2017-08-05 04:02:39
last_update2017-08-05 04:02:39
depth3
children0
last_payout2017-08-12 04:02:39
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length11
author_reputation358,607,262,440
root_title"Security Through Obscurity ... and Why It Isn't"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id10,815,091
net_rshares0
@shifty0g ·
$0.08
Layers of security. follow best practises  and hide in plain site. dont make yourself obvious low hanging fruit.
👍  
properties (23)
authorshifty0g
permlinkre-netuoso-security-through-obscurity-and-why-it-isn-t-20170805t091057264z
categorysecurity
json_metadata{"tags":["security"],"app":"steemit/0.1"}
created2017-08-05 09:10:57
last_update2017-08-05 09:10:57
depth1
children0
last_payout2017-08-12 09:10:57
cashout_time1969-12-31 23:59:59
total_payout_value0.057 HBD
curator_payout_value0.018 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length112
author_reputation103,079,298,002
root_title"Security Through Obscurity ... and Why It Isn't"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id10,833,314
net_rshares19,650,827,456
author_curate_reward""
vote details (1)