this post was submitted on 02 Jun 2025
2085 points (99.4% liked)

memes

16638 readers
2652 users here now

Community rules

1. Be civilNo trolling, bigotry or other insulting / annoying behaviour

2. No politicsThis is non-politics community. For political memes please go to !politicalmemes@lemmy.world

3. No recent repostsCheck for reposts when posting a meme, you can only repost after 1 month

4. No botsNo bots without the express approval of the mods or the admins

5. No Spam/Ads/AI SlopNo advertisements or spam. This is an instance rule and the only way to live. We also consider AI slop to be spam in this community and is subject to removal.

A collection of some classic Lemmy memes for your enjoyment

Sister communities

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] MotoAsh@lemmy.world 0 points 2 months ago (1 children)

No, it is not security through obscurity. It's a message signature algorithm, which are used in cryptography all the time.

You're falling for the classic paradox of security: it has to work for someone. OF COURSE if you get all of the keys and every detail of the process you can crack it. That's true of ALL CRYPTOGRAPHY. If someone knows everything including the keys, it's too late for any 'secure' device.

[–] Saledovil@sh.itjust.works 1 points 2 months ago (1 children)

No, it is not security through obscurity. It’s a message signature algorithm, which are used in cryptography all the time.

Yes it is. The scheme is that when you take a picture, the camera signs said picture. The key is stored somewhere in the camera. Hence the secrecy of the key hinges on the the attacker not knowing how the camera accesses the key. Once the attacker knows that, they can get the key from the camera. Therefore, security hinges on the secrecy of the camera design/protocol used by the camera to access the key, in addition to the secrecy of the key. Therefore, it is security by obscurity.

[–] MotoAsh@lemmy.world 0 points 1 month ago (1 children)

And how do they get the camera? You could make the same exact claims about SSH being useless because "if an attacker gets the key, it's over!"

NO SHIT!!

[–] Saledovil@sh.itjust.works 0 points 1 month ago

They buy it at a store.