From mboxrd@z Thu Jan 1 00:00:00 1970 Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: "J-P. Rosen" Newsgroups: comp.lang.ada Subject: Re: Ada/GNAT/AWS-friendly web hosting Date: Fri, 13 Sep 2024 08:46:33 +0200 Organization: Adalog Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Injection-Date: Fri, 13 Sep 2024 08:46:30 +0200 (CEST) Injection-Info: dont-email.me; posting-host="d64d9c95d8fe8dec6e96687108ba365e"; logging-data="787142"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+qLWGeweXNF/mpjwROUBzC" User-Agent: Mozilla Thunderbird Cancel-Lock: sha1:uzIT5kfcGlsseFp0DSBpxy2Ubig= In-Reply-To: Content-Language: en-US, fr Xref: news.eternal-september.org comp.lang.ada:66360 List-Id: Le 13/09/2024 à 00:35, Lawrence D'Oliveiro a écrit : > On Thu, 12 Sep 2024 19:06:08 +0200, J-P. Rosen wrote: > >> But security breaches mainly use known bugs in Apache... If you write >> your own server with AWS, the attacker knows nothing about the software >> that answers! > > That’s called “security through obscurity”. Not recommended. No, AWS is public and there is nothing hidden. Just that, since there are wayyyyy more users of Apache than of AWS, attackers will not bother to try to break in -- J-P. Rosen Adalog 2 rue du Docteur Lombard, 92441 Issy-les-Moulineaux CEDEX https://www.adalog.fr https://www.adacontrol.fr