> Security through obscurity isn’t an invalid technique if you also are doing security through cryptography too
It becomes a distraction vs actually writing a secure set of endpoints in the first place.. Folks get a sense of security from it which is entirely false.