Would you use a crappy password and rely on the nonstandard port to deter attackers? That's what security *through* obscurity means.
Sure, if you get lucky you might stop or deter some attackers, but you should always assume that isn't the case.
-
-
Could you determine the port separately from the password though? If yes, 2^key_size + 2^16 (negligible) If no 2^(key_size +16)
-
Obviously yes, you can determine the port separately from the password. Why would you think otherwise?
- Show replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.