onecommentman 38 minutes ago

Sounds like the Author is arguing in favor of “security through obscurity”. There are well-known issues with this approach that those interested can research.