<div dir="ltr">Thx both. Another application I think is some of the wi-fi or bluetooth components being added to cars, I think in some cases for unlocking (?). I remember reading about that a while ago. I&#39;m interested in this in part to try to bridge a gap between privacy people and security folks. When some privacy scholars say &quot;obscurity&quot; they act as if the words stay in a privacy context (which is supposed to exist in the abstract) without security comment or consideration. I thought the disconnect might form connections. </div><div class="gmail_extra"><br><div class="gmail_quote">On Wed, Feb 18, 2015 at 10:25 PM, Peter Baumgarten <span dir="ltr">&lt;<a href="mailto:me@peter-baumgarten.com" target="_blank">me@peter-baumgarten.com</a>&gt;</span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">A good example I can think of is wifi. Instead of using something like<br>
WPA2 to secure an access point one can instead to just not broadcast the<br>
SSID. The wifi network will not show up on a list of networks to connect<br>
to but one can just manually enter in the SSID and then they can<br>
connect. I do not if that helps you Dan, but it is the example I think<br>
of when I hear security through/by obscurity and that it is bad.<br>
<div class="HOEnZb"><div class="h5"><br>
On Wed, 2015-02-18 at 22:18 -0600, brian wrote:<br>
&gt; I really don&#39;t know any good examples, though, I was able to find this<br>
&gt; techdirt article from last year about <a href="http://healthcare.gov" target="_blank">healthcare.gov</a>.<br>
&gt;<br>
&gt; <a href="https://www.techdirt.com/articles/20140820/15163928269/white-house-going-with-security-obscurity-as-excuse-refusing-to-release-healthcaregov-security-details.shtml" target="_blank">https://www.techdirt.com/articles/20140820/15163928269/white-house-going-with-security-obscurity-as-excuse-refusing-to-release-healthcaregov-security-details.shtml</a><br>
&gt;<br>
&gt; Hope that helps you start the search.<br>
&gt;<br>
&gt; -Brian<br>
&gt;<br>
&gt; On 02/15/2015 03:58 PM, Dan Massoglia wrote:<br>
&gt;<br>
&gt; &gt; Hey CP Ppl,<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt; Does anyone have good information--preferably academic for what I&#39;m<br>
&gt; &gt; doing right now but security blogs or something cool too--about<br>
&gt; &gt; Security through obscurity. We touched on it briefly at CryptoParty.<br>
&gt; &gt; H8 sending out this ask without more but I&#39;m at a loss for starting<br>
&gt; &gt; on the security stuff sometimes. XO thanks<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt; Dan<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt; _______________________________________________<br>
&gt; &gt; cryptoparty-chi mailing list<br>
&gt; &gt; <a href="mailto:cryptoparty-chi@groups.sshchicago.org">cryptoparty-chi@groups.sshchicago.org</a><br>
&gt; &gt; <a href="http://groups.sshchicago.org/listinfo/cryptoparty-chi" target="_blank">http://groups.sshchicago.org/listinfo/cryptoparty-chi</a><br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; cryptoparty-chi mailing list<br>
&gt; <a href="mailto:cryptoparty-chi@groups.sshchicago.org">cryptoparty-chi@groups.sshchicago.org</a><br>
&gt; <a href="http://groups.sshchicago.org/listinfo/cryptoparty-chi" target="_blank">http://groups.sshchicago.org/listinfo/cryptoparty-chi</a><br>
<br>
</div></div><br>_______________________________________________<br>
cryptoparty-chi mailing list<br>
<a href="mailto:cryptoparty-chi@groups.sshchicago.org">cryptoparty-chi@groups.sshchicago.org</a><br>
<a href="http://groups.sshchicago.org/listinfo/cryptoparty-chi" target="_blank">http://groups.sshchicago.org/listinfo/cryptoparty-chi</a><br>
<br></blockquote></div><br></div>