If you do not know the password but know how to use the password to gain access to something that was secured using this password, then this is security by obscurity.
On the other hand, if you know the password but do not know how to use the password, then this is obscurity by security.
(Sources of inspiration: The Butterfly Dream, Category Theory’s reversal of rows.)
Like this:
Like Loading...
Related Posts
Author: Omer Zak
I am deaf since birth. I played with big computers which eat punched cards and spew out printouts since age 12. Ever since they became available, I work and play with desktop size computers which eat keyboard keypresses and spew out display pixels.
Among other things, I developed software which helped the deaf in Israel use the telephone network, by means of home computers equipped with modems. Several years later, I developed Hebrew localizations for some cellular phones, which helped the deaf in Israel utilize the cellular phone networks.
I am interested in entrepreneurship, Science Fiction and making the world more accessible to people with disabilities.
View all posts by Omer Zak