What Is Security Through Obscurity?

"Security Through Obscurity" is a term a lot of geeks throw around but there are more than a few out there that don’t quite get what it means.

First I’ll tell you what security through obscurity isn’t.

  • It is not choosing a stronger password.
  • It is not anything that can be immediately identified as secured.
  • It does not ordinarily involve encryption of data.

Security through obscurity more or less means "hiding in plain sight". Where data storage is concerned it depends on hardware rather than software, and you’ll understand what I mean in a moment by that.

Here are three ways of using security through obscurity:

5.25 Floppy Diskettes

image

If you write data to a 5.25 floppy diskette, nobody else will be able to read it because save for vintage computer hobbyists, nobody has the drives. The data on the diskette can be completely unencrypted and it doesn’t matter, because who has a drive to read it?

And to date, unless someone can prove me wrong, there is no such thing as a USB-connected 5.25 floppy diskette drive you can actually buy. 3.5-inch yes, but 5.25-inch, no.

No, I’m not suggesting you write your sensitive data to 5.25 floppies, but it is a very good example of security through obscurity.

"Broken" USB Cable

hacked-usb-cable

The HACKED! USB Cable appears to be a plain cable that’s been ripped apart, but it isn’t. In fact, it is a fully-working USB drive that’s been made to look completely broken.

Data Files On Audio CD

compactdisc

This one involves a bit of know-how when it comes to writing data to CDs, but it is totally possible to write audio and data to the same disc. Nero Burning ROM allows you to do this easily. For anyone that pops the disc into a music player, it will play the audio present. When put in a computer, the data files can be accessed.

If looking to hide data in plain sight, this is probably the easiest of the three.

Free eBook!

Like what you read?

If so, please join over 28,000 people who receive our exclusive weekly newsletter and computer tips, and get FREE COPIES of 5 eBooks we created, as our gift to you for subscribing. Just enter your name and email below:

Post A Comment Using Facebook

Discuss This Article (Without Facebook)

4 comments

  1. Totally digging that “broken” USB drive xD

  2. Security through obscurity is also when there is a security hole in a script on your web site but nobody will find it because you wrote that script and no other site has it and your site is not attractive to hackers on the web. I have heard the term used as an explanation as to why there are far fewer malware on Mac computers – fewer people using them compared to Windows users and therefore allegedly less atractive to hackers.

  3. You can also hide your sensitive data inside of rarely looked folders like common files or in any folder in c:/windows.
    You can change the extension of your files (ie; jpg to dll, avi to rar)

  4. It was just nice information sharing and its helpful for everyone.

Leave a Reply

PCMech Insider Cover Images - Subscribe To Get Your Copies!
Learn More
Every week, hundreds of tech enthusiasts, computer owners
and geeks read The Insider, the digital magazine of PCMech.

What’s Your Preference?

Daily Alerts

Each day we send out a quick email to thousands of PCMECH readers to notify them of new posts. This email is just a short, plain email with titles and links to our latest posts. You can unsubscribe from this service at any time.

You can subscribe to it by leaving your email address in the following field and confirming your subscription when you get an email asking you to do so.

Enter your email address for
Daily Updates:

Weekly Newsletter

Running for over 6 years, the PCMECH weekly newsletter helps you keep tabs on the world of tech. Each issue includes news bits, an article, an exclusive rant as well as a download of the week. This newsletter is subscribed to by over 28,000 readers (many who also subscribe to the other option) - come join the community!

To subscribe to this weekly newsletter simply add your email address to the following field and then follow the confirmation prompts. You will be able to unsubscribe at any time.

Enter your email address for
Free Weekly Newsletter: