SHARE
Facebook X Pinterest WhatsApp

Security Through Obscurity? It’s Not All Bad

Written By
CS
Carla Schroder
Jun 1, 2007

“Security-through-obscurity is rightfully derided under most
circumstances. My favorite examples are silly copy-protection
schemes that are trivially foiled:

  1. “The seekrit write-protect tab on 3.5″ diskettes. Y’all
    youngsters may not remember these at all, but back in the last
    millennium, commercial software was distributed on diskettes. These
    had a little plastic tab that you could open when you wanted to
    write-protect the diskette. This was a useful way to protect us
    from our own mistakes. Modern SD camera cards have a switch that is
    similar to these, and I think that is a nice thing. But the vendors
    who thought that shipping their software with the write-tab open
    gave them meaningful copy-protection were thinking very strangely,
    because you could still copy the diskette. Some of them went as far
    as removing the tab entirely. So the remedy was sticking a piece of
    tape over the hole. (I am not making this up! I was
    there…!)”


Complete Story

CS

Carla Schroder

Recommended for you...

A Thorough Approach to Improve the Privacy and Security of Your Linux PC
Damien
Oct 24, 2024
Several Russian Maintainers Removed From Linux Kernel Due To Compliance Concerns
Senthil Kumar
Oct 23, 2024
OpenSSH Splits Again: New Authentication Binary Unveiled
Bobby Borisov
Oct 16, 2024
13 Best Free and Open Source Anti-Malware Tools
webmaster
Oct 14, 2024
Linux Today Logo

LinuxToday is a trusted, contributor-driven news resource supporting all types of Linux users. Our thriving international community engages with us through social media and frequent content contributions aimed at solving problems ranging from personal computing to enterprise-level IT operations. LinuxToday serves as a home for a community that struggles to find comparable information elsewhere on the web.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.