this post was submitted on 03 Jul 2024
629 points (99.4% liked)

Not The Onion

12390 readers
493 users here now

Welcome

We're not The Onion! Not affiliated with them in any way! Not operated by them in any way! All the news here is real!

The Rules

Posts must be:

  1. Links to news stories from...
  2. ...credible sources, with...
  3. ...their original headlines, that...
  4. ...would make people who see the headline think, “That has got to be a story from The Onion, America’s Finest News Source.”

Comments must abide by the server rules for Lemmy.world and generally abstain from trollish, bigoted, or otherwise disruptive behavior that makes this community less fun for everyone.

And that’s basically it!

founded 1 year ago
MODERATORS
 

Crossposted from [email protected]

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 49 points 4 months ago (1 children)

Security through obscurity would be having a system connected to a network, but relying on a secret / unknown protocol to secure it.

Air-gapping a system is a real and very useful security method. That being said, it's not enough by itself.

If you're interested, have a look at past examples, like the recent work on breaking Tetra communication standard and Stuxnet.

[–] [email protected] 4 points 4 months ago

As another guy joked it's really is genuinely more accurate to call floppy discs security by obsolescence because everyone doesn't have the stuff required to manipulate/read floppy discs and there are even people who don't even know what a floppy disk is and just think it's a physical save button