Help


from Wikipedia
« »  
A variant of the defense in the previous paragraph is to have a double-layer of detection of the exploit ; both of which are kept secret but one is allowed to be " leaked ".
The idea is to give the attacker a false sense of confidence that the obscurity has been uncovered and defeated.
An example of where this would be used is as part of a honeypot.
In neither of these cases is there any actual reliance on obscurity for security ; these are perhaps better termed obscurity bait in an active security defense.

1.792 seconds.