Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You're deluding yourself. Security through obscurity is barely worth the effort.

If you want this done in a fashion that's secure, deploy it on a small device like a Raspberry Pi and firewall that thing so aggressively you can barely get in. It's hard to hack what you can't connect to.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: