1990, W Cattey,The Evolution of turnin A Classroom Oriented File Exchange Service, USENIX Summer Conference:
Thissecurity through obscurity proved adequate for our prototype, but it was unacceptable for aturnin service in wide use.
2006, Harold F. Tipton, Micki Krause,Information Security Management Handbook:
According tosecurity-through-obscurity advocates, if we carefully hide our gaping vulnerabilities from our enemies, the bad guys will give up in frustration when they cannot easily find holes.
2008, Shon Harris,CISSP All-in-One Exam Guide:
Things such assecurity through obscurity become common practices that usually have damaging results.