From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,FREEMAIL_FROM autolearn=unavailable autolearn_force=no version=3.4.4 X-Received: by 10.224.69.6 with SMTP id x6mr2346219qai.0.1375906157902; Wed, 07 Aug 2013 13:09:17 -0700 (PDT) X-Received: by 10.50.77.78 with SMTP id q14mr217289igw.2.1375906157862; Wed, 07 Aug 2013 13:09:17 -0700 (PDT) Path: eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!news.eternal-september.org!news.eternal-september.org!feeder.eternal-september.org!news.bbs-scene.org!border4.nntp.dca.giganews.com!border2.nntp.dca.giganews.com!nntp.giganews.com!f7no1523205qan.0!news-out.google.com!he10ni877qab.0!nntp.google.com!fx3no1593041qab.0!postnews.google.com!glegroupsg2000goo.googlegroups.com!not-for-mail Newsgroups: comp.lang.ada Date: Wed, 7 Aug 2013 13:09:17 -0700 (PDT) In-Reply-To: Complaints-To: groups-abuse@google.com Injection-Info: glegroupsg2000goo.googlegroups.com; posting-host=63.80.193.9; posting-account=nD_N8QoAAACgNfe5vMwm0rMAu4pgYumJ NNTP-Posting-Host: 63.80.193.9 References: <85li4gmhrt.fsf@stephe-leake.org> <2wgl8bcmdsu0$.1rs1604fzwufv.dlg@40tude.net> <85vc3jfias.fsf@stephe-leake.org> <1gwg87tgm2bo7$.ae7440ka6kmc.dlg@40tude.net> <85bo59g6h7.fsf@stephe-leake.org> User-Agent: G2/1.0 MIME-Version: 1.0 Message-ID: <5987935c-dbce-4602-b0e6-2bb85513588b@googlegroups.com> Subject: Re: library/binding for sftp? From: Alan Jump Injection-Date: Wed, 07 Aug 2013 20:09:17 +0000 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Xref: news.eternal-september.org comp.lang.ada:16697 Date: 2013-08-07T13:09:17-07:00 List-Id: On Wednesday, August 7, 2013 12:57:37 PM UTC-7, Dmitry A. Kazakov wrote: > Of course, just because you=CE=BF=CE=8F=C2=BDre paranoid doesn=CE=BF=CE= =8F=C2=BDt mean they=CE=BF=CE=8F=C2=BDre not after you. > But it is always a balance between the price of the information and the > price of breaking into. Security by obscurity has a very good ratio in TH= IS > concrete case, likely better than of any publicly available protocol. >=20 > P.S. Remember the code talkers story. There's a world of difference between knowing the technique and knowing the= specific encoding material. One can know how to use a one-time pad for enc= ryption or decryption, but without possessing the specific key material, th= e result will still be a jumble of numbers. The same can be applied to security protocols. Think "asymmetric keys". - - 73 de N5ILN Alan