Jump to content

Talk:Security through obscurity

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Rgamble (talk | contribs) at 13:21, 28 August 2002 (Agreement.). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Sympathetic though I may be to the gist of the text, as written it doesn't seem very NPOV. -- April

Suppose it were divided into three sections: neutral description of the practice; criticism and shortcomings of the practice; defense of the practice. Possibly a fourth section describing the ongoing debate about the level and timing of vulnerability disclosures. I agree that the article shouldn't just start slamming the practice in the introductory paragraph. The pros and cons are important information however. Wesley 13:20 Aug 28, 2002 (PDT)

I agree with most of what's written, but it isn't presented in a NPOV fashion. Wesley's proposed fix seems like a good one to me. Rgamble