onecommentman 38 minutes ago Sounds like the Author is arguing in favor of “security through obscurity”. There are well-known issues with this approach that those interested can research.
Sounds like the Author is arguing in favor of “security through obscurity”. There are well-known issues with this approach that those interested can research.