[time-nuts] Sinlge ADC multi-band receiver

Eric Scace eric at scace.org
Mon Apr 10 17:08:14 EDT 2017


   This approach is known as “security through obscurity”, and is deprecated in the professional of information security. What one invents, another can discover.

   The most secure systems use well-documented algorithms with open-source software — widely scrutinized for bugs or implants, and therefore with well-understood performance limitations. The secrecy comes from good crypto key management.

— Eric

> On 2017 Apr 10, at 13:58 , Attila Kinali <attila at kinali.ch> wrote:
> 
> And they also learned
> that not documenting it is the best protection against people using it.

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 842 bytes
Desc: Message signed with OpenPGP
URL: <http://www.febo.com/pipermail/time-nuts/attachments/20170410/61a73f0e/attachment.sig>


More information about the time-nuts mailing list