<div dir="ltr">Thx both. Another application I think is some of the wi-fi or bluetooth components being added to cars, I think in some cases for unlocking (?). I remember reading about that a while ago. I'm interested in this in part to try to bridge a gap between privacy people and security folks. When some privacy scholars say "obscurity" they act as if the words stay in a privacy context (which is supposed to exist in the abstract) without security comment or consideration. I thought the disconnect might form connections. </div><div class="gmail_extra"><br><div class="gmail_quote">On Wed, Feb 18, 2015 at 10:25 PM, Peter Baumgarten <span dir="ltr"><<a href="mailto:me@peter-baumgarten.com" target="_blank">me@peter-baumgarten.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">A good example I can think of is wifi. Instead of using something like<br>
WPA2 to secure an access point one can instead to just not broadcast the<br>
SSID. The wifi network will not show up on a list of networks to connect<br>
to but one can just manually enter in the SSID and then they can<br>
connect. I do not if that helps you Dan, but it is the example I think<br>
of when I hear security through/by obscurity and that it is bad.<br>
<div class="HOEnZb"><div class="h5"><br>
On Wed, 2015-02-18 at 22:18 -0600, brian wrote:<br>
> I really don't know any good examples, though, I was able to find this<br>
> techdirt article from last year about <a href="http://healthcare.gov" target="_blank">healthcare.gov</a>.<br>
><br>
> <a href="https://www.techdirt.com/articles/20140820/15163928269/white-house-going-with-security-obscurity-as-excuse-refusing-to-release-healthcaregov-security-details.shtml" target="_blank">https://www.techdirt.com/articles/20140820/15163928269/white-house-going-with-security-obscurity-as-excuse-refusing-to-release-healthcaregov-security-details.shtml</a><br>
><br>
> Hope that helps you start the search.<br>
><br>
> -Brian<br>
><br>
> On 02/15/2015 03:58 PM, Dan Massoglia wrote:<br>
><br>
> > Hey CP Ppl,<br>
> ><br>
> ><br>
> > Does anyone have good information--preferably academic for what I'm<br>
> > doing right now but security blogs or something cool too--about<br>
> > Security through obscurity. We touched on it briefly at CryptoParty.<br>
> > H8 sending out this ask without more but I'm at a loss for starting<br>
> > on the security stuff sometimes. XO thanks<br>
> ><br>
> ><br>
> > Dan<br>
> ><br>
> ><br>
> > _______________________________________________<br>
> > cryptoparty-chi mailing list<br>
> > <a href="mailto:cryptoparty-chi@groups.sshchicago.org">cryptoparty-chi@groups.sshchicago.org</a><br>
> > <a href="http://groups.sshchicago.org/listinfo/cryptoparty-chi" target="_blank">http://groups.sshchicago.org/listinfo/cryptoparty-chi</a><br>
><br>
> _______________________________________________<br>
> cryptoparty-chi mailing list<br>
> <a href="mailto:cryptoparty-chi@groups.sshchicago.org">cryptoparty-chi@groups.sshchicago.org</a><br>
> <a href="http://groups.sshchicago.org/listinfo/cryptoparty-chi" target="_blank">http://groups.sshchicago.org/listinfo/cryptoparty-chi</a><br>
<br>
</div></div><br>_______________________________________________<br>
cryptoparty-chi mailing list<br>
<a href="mailto:cryptoparty-chi@groups.sshchicago.org">cryptoparty-chi@groups.sshchicago.org</a><br>
<a href="http://groups.sshchicago.org/listinfo/cryptoparty-chi" target="_blank">http://groups.sshchicago.org/listinfo/cryptoparty-chi</a><br>
<br></blockquote></div><br></div>