 # Security Through Obscurity .. and Why It Isn't Lately, I have been seeing a lot of people discussing system and network administration as it relates to setting up STEEM nodes or Witness servers. Something that keeps cropping up, is how to keep the server secure from hackers or outside abuse. One of the number one things that people suggest, is to change the SSH port from the default of 22 to something else. Today, I want to discuss the difference between **security through obscurity** and **security through secrecy**. ## Lets' dive right in Security through obscurity is defined as **reliance on the secrecy of the design or implementation as the main method of providing security for a system or component of a system**. Security through secrecy is defined as **reliance on the measurability of the probability a security measure can be broken.** ## Security Through Obscurity Some examples of this practice are: - Hiding a key under a rock near a locked door - Changing default ports to non-default ports - Wearing a baseball cap and sunglasses to avoid facial recognition - Changing the color of a car to run from the police As you can tell, some of these examples might actually work to keep a secret hidden for some time. However, relying on only one method of security is sure to fail. ## Security Through Secrecy Some example of this practice are: - A passphrase that uses a high amount of entropy - A hidden code language that you created - A combination lock on a briefcase Again, as you can tell, some of these examples will provide a high level of security. However, they can often still be broken. The passphrase might not be complex enough, the code language not unique enough, or the combination lock can be brute forced given enough time. Despite the fact that we realize these security mechanisms can be broken, we can often figure out exactly how much time, effort, and money would be required to perform such a feat.  ## Cost Examples With current technology, a 512-bit RSA key can be broken in around 3 hours for about $70. And the guides that are available make this very doable for the average netizen. Once you start raising the entropy, you start getting into the realm of an attack that would take hundreds, thousands, or even millions of years to complete. Despite the fact that it is eventually breakable, the cost and effort is insurmountable, therefore making the attack implausible. A combination padlock might take only a few hours for an attacker to crack open. Usually, this level of security is enough for people traveling with a briefcase or suitcase for a short while. There is no need to have security capable of protecting the bags contents indefinitely unless it is the President's Nuclear Football. ## So I shouldn't do security through obscurity? Wrong. You should have multiple layers of security in any situation where you need to protect something from unwanted access. Your security plan should be like an onion; having many layers. You should expect that a determined attacked will eventually break through anything you have in place. Multiple layers of security give you enough time to be able to react to their unwarranted attempts at access. ## Other Options Other method and tips exist to increase the cost and effort required to break security measures. Things such as banning IP addresses that make too many failed login attempts, or throttling connections so brute forcers are unable to try so many logins. ## Closing Notes Despite taking every possible security measure you can think of, someone will always be able to find a weak point in your system. There will always be a way in that you did not think to seal. With this logic in mind, you should try to implement as many mechanisms as you can including logging, alerting, backups, and firewalls. Don't rely on keeping things secret from the enemy. Worry about making it financially impossible for them to break through your known security implementation. # The reliance of a secret remaining secret means it won't.
author | netuoso |
---|---|
permlink | security-through-obscurity-and-why-it-isn-t |
category | security |
json_metadata | {"tags":["security","programming","steem-dev","steemit","devops"],"image":["https://steemitimages.com/DQmUfpFMMqCaUF87RB9qSAM59rXfMM9nnNJ8hUJBJv3xnmF/security-fingerprint.jpg","https://steemitimages.com/DQmXHnWTZnarxVNrjUpGpFxrbFKsjGg6Nfhdsx5J9JYr1AL/security-keywords.jpg"],"app":"steemit/0.1","format":"markdown"} |
created | 2017-08-05 03:09:15 |
last_update | 2017-08-05 03:09:15 |
depth | 0 |
children | 6 |
last_payout | 2017-08-12 03:09:15 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 7.936 HBD |
curator_payout_value | 0.570 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 4,296 |
author_reputation | 151,901,967,807,285 |
root_title | "Security Through Obscurity ... and Why It Isn't" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 0 |
post_id | 10,811,923 |
net_rshares | 2,137,374,295,495 |
author_curate_reward | "" |
voter | weight | wgt% | rshares | pct | time |
---|---|---|---|---|---|
proctologic | 0 | 3,838,256,502 | 2% | ||
team | 0 | 81,328,001,457 | 10% | ||
teamsteem | 0 | 370,856,802,740 | 2% | ||
coininstant | 0 | 165,108,435,953 | 100% | ||
orenshani7 | 0 | 100,746,267,829 | 100% | ||
honusurf | 0 | 73,599,335,841 | 100% | ||
realitycheck | 0 | 1,407,573,673 | 100% | ||
jraysteem | 0 | 1,883,376,072 | 50% | ||
stackin | 0 | 8,420,439,300 | 1% | ||
azissuloh | 0 | 825,792,049 | 100% | ||
steeminator3000 | 0 | 317,183,932 | 20% | ||
netuoso | 0 | 1,168,602,890,277 | 100% | ||
eturnerx | 0 | 39,342,587,527 | 20% | ||
msp-lovebot | 0 | 27,052,034,501 | 5% | ||
crypto-expo | 0 | 116,360,929 | 100% | ||
msp-shanehug | 0 | 49,342,713,032 | 50% | ||
tristan.macinnes | 0 | 619,520,000 | 100% | ||
msp-nomad | 0 | 41,782,797,355 | 100% | ||
michielano | 0 | 328,542,603 | 100% | ||
bukharisulaiman | 0 | 636,830,123 | 100% | ||
pfiffel | 0 | 1,051,283,400 | 40% | ||
younes04 | 0 | 167,270,400 | 100% |
thank you for sharing @neutuso glad to see this article
author | azissuloh |
---|---|
permlink | re-netuoso-security-through-obscurity-and-why-it-isn-t-20170805t031238743z |
category | security |
json_metadata | {"tags":["security"],"users":["neutuso"],"app":"steemit/0.1"} |
created | 2017-08-05 03:12:36 |
last_update | 2017-08-05 03:12:36 |
depth | 1 |
children | 0 |
last_payout | 2017-08-12 03:12:36 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.000 HBD |
curator_payout_value | 0.000 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 55 |
author_reputation | 6,978,132,461,726 |
root_title | "Security Through Obscurity ... and Why It Isn't" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 10,812,111 |
net_rshares | 0 |
My greetings from aceh @bukharisulaiman. I am a newcomer in steemit. Information and experience from friends is very useful to me. Please guide me @netuoso
author | bukharisulaiman |
---|---|
permlink | re-netuoso-security-through-obscurity-and-why-it-isn-t-20170805t061348469z |
category | security |
json_metadata | {"tags":["security"],"users":["bukharisulaiman","netuoso"],"app":"steemit/0.1"} |
created | 2017-08-05 06:13:48 |
last_update | 2017-08-05 06:13:48 |
depth | 1 |
children | 0 |
last_payout | 2017-08-12 06:13:48 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.000 HBD |
curator_payout_value | 0.000 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 155 |
author_reputation | 3,201,697,376,144 |
root_title | "Security Through Obscurity ... and Why It Isn't" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 10,822,854 |
net_rshares | 0 |
This might be as important as placing a band aid over your laptop camera. ***Wearing a baseball cap and sunglasses to avoid facial recognition***
author | realitycheck |
---|---|
permlink | re-netuoso-security-through-obscurity-and-why-it-isn-t-20170805t031832023z |
category | security |
json_metadata | {"tags":["security"],"app":"steemit/0.1"} |
created | 2017-08-05 03:18:33 |
last_update | 2017-08-05 03:18:33 |
depth | 1 |
children | 2 |
last_payout | 2017-08-12 03:18:33 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.000 HBD |
curator_payout_value | 0.000 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 145 |
author_reputation | 358,607,262,440 |
root_title | "Security Through Obscurity ... and Why It Isn't" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 10,812,475 |
net_rshares | 0 |
 Even smart people rely on silly methods for "security".
author | netuoso |
---|---|
permlink | re-realitycheck-re-netuoso-security-through-obscurity-and-why-it-isn-t-20170805t033219167z |
category | security |
json_metadata | {"tags":["security"],"image":["https://steemitimages.com/DQmZa32hFTWP3GWRze7HDvC4cphawxhC9gw4LMZnbmy9M6b/image.png"],"app":"steemit/0.1"} |
created | 2017-08-05 03:32:18 |
last_update | 2017-08-05 03:32:18 |
depth | 2 |
children | 1 |
last_payout | 2017-08-12 03:32:18 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.000 HBD |
curator_payout_value | 0.000 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 145 |
author_reputation | 151,901,967,807,285 |
root_title | "Security Through Obscurity ... and Why It Isn't" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 10,813,245 |
net_rshares | 0 |
Appears so!
author | realitycheck |
---|---|
permlink | re-netuoso-re-realitycheck-re-netuoso-security-through-obscurity-and-why-it-isn-t-20170805t040238260z |
category | security |
json_metadata | {"tags":["security"],"app":"steemit/0.1"} |
created | 2017-08-05 04:02:39 |
last_update | 2017-08-05 04:02:39 |
depth | 3 |
children | 0 |
last_payout | 2017-08-12 04:02:39 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.000 HBD |
curator_payout_value | 0.000 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 11 |
author_reputation | 358,607,262,440 |
root_title | "Security Through Obscurity ... and Why It Isn't" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 10,815,091 |
net_rshares | 0 |
Layers of security. follow best practises and hide in plain site. dont make yourself obvious low hanging fruit.
author | shifty0g |
---|---|
permlink | re-netuoso-security-through-obscurity-and-why-it-isn-t-20170805t091057264z |
category | security |
json_metadata | {"tags":["security"],"app":"steemit/0.1"} |
created | 2017-08-05 09:10:57 |
last_update | 2017-08-05 09:10:57 |
depth | 1 |
children | 0 |
last_payout | 2017-08-12 09:10:57 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.057 HBD |
curator_payout_value | 0.018 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 112 |
author_reputation | 103,079,298,002 |
root_title | "Security Through Obscurity ... and Why It Isn't" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 10,833,314 |
net_rshares | 19,650,827,456 |
author_curate_reward | "" |
voter | weight | wgt% | rshares | pct | time |
---|---|---|---|---|---|
shifty0g | 0 | 19,650,827,456 | 100% |