@2fd7551e @b214e325 That sounds very like 'security by obscurity'. I hope it isn't.
@ad854657 If you read the above blog post I've tried to explain it clearly.