Good defense is created by defense-in-depth; and by obscurity doesn't cost much inasmuch as it deflects "rudimentary" acts of reconnaissance — which unsurprisingly makes log parsing easier as there is less noise to work with.

I also appreciate the author's visual metaphor w.r.t. real-world examples, since that's always been the inspiration for the insertion of obscurity into a larger, more robust information security posture.

Sign in to participate in the conversation

Fosstodon is an English speaking Mastodon instance that is open to anyone who is interested in technology; particularly free & open source software.