this post was submitted on 05 Dec 2023
577 points (89.9% liked)

Technology

59091 readers
4107 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 32 points 11 months ago

Tell me you have never worked in IT security without telling me you never worked in IT security.

To give you an actual answer, instead of pure Internet snark, the concept you're proposing is called "security through obscurity" if you want to research it.

The TL:DR of it is it doesn't work. If it did, all software would be proprietary and things like viruses wouldn't exist. The source code for Windows isn't available, but Windows gets exploited constantly.