[time-nuts] Sinlge ADC multi-band receiver
eric at scace.org
Mon Apr 10 17:08:14 EDT 2017
This approach is known as “security through obscurity”, and is deprecated in the professional of information security. What one invents, another can discover.
The most secure systems use well-documented algorithms with open-source software — widely scrutinized for bugs or implants, and therefore with well-understood performance limitations. The secrecy comes from good crypto key management.
> On 2017 Apr 10, at 13:58 , Attila Kinali <attila at kinali.ch> wrote:
> And they also learned
> that not documenting it is the best protection against people using it.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 842 bytes
Desc: Message signed with OpenPGP
More information about the time-nuts