security through obscurity
security through obscurity (alt. `security by obscurity')
A term applied by hackers to most OS vendors' favorite way of
coping with security holes -- namely, ignoring them, documenting
neither any known holes nor the underlying security algorithms,
trusting that nobody will find out about them and that people who
do find out about them won't exploit them. This "strategy" never
works for long and occasionally sets the world up for debacles like
the {RTM} worm of 1988 (see {Great Worm, the}), but once the
brief moments of panic created by such events subside most vendors
are all too willing to turn over and go back to sleep. After all,
actually fixing the bugs would siphon off the resources needed to
implement the next user-interface frill on marketing's wish list
-- and besides, if they started fixing security bugs customers
might begin to *expect* it and imagine that their warranties
of merchantability gave them some sort of *right* to a system
with fewer holes in it than a shotgunned Swiss cheese, and
*then* where would we be?
Historical note: There are conflicting stories about the origin of
this term. It has been claimed that it was first used in the
Usenet newsgroup in comp.sys.apollo during a campaign to get
HP/Apollo to fix security problems in its UNIX-{clone}
Aegis/DomainOS (they didn't change a thing). {ITS} fans, on the
other hand, say it was coined years earlier in opposition to the
incredibly paranoid {Multics} people down the hall, for whom
security was everything. In the ITS culture it referred to (1) the
fact that by the time a tourist figured out how to make
trouble he'd generally gotten over the urge to make it, because he
felt part of the community; and (2) (self-mockingly) the poor
coverage of the documentation and obscurity of many commands. One
instance of *deliberate* security through obscurity is
recorded; the command to allow patching the running ITS system
({altmode} altmode control-R) echoed as $$^D. If you actually
typed alt alt ^D, that set a flag that would prevent patching the
system even if you later got it right.
HTML Conversion by AG2HTML.pl V2.94618 & witbrock@cs.cmu.edu