## [[Cryptography]]
### [[PGP encryption method]]
## Security techniques
### [[Security by obscurity]]
This method relies on the fact that it's difficult to attack something unless you know it exists. For example, when attempting to hide a webpage from users, it may be sufficient to give it a long and unwieldy hexadecimal string as a name, because it's not something people are likely to find. This method works best for non-confidential information, as it involves publishing the information and attempting to hide in plain sight.
### [[Security by difficulty]]
Security by difficulty is probably the most popular method, and it relies on attackers having limited computing resources. Most modern algorithms _can_ be solved; it's just not feasible to solve them.
A disadvantage of this approach is that it needs to be regularly revised as technology advances. In a way, this approach is a race between technological knowledge and mathematical knowledge, as it tends to rely on mathematics to calculate what is theoretically possible to solve before computing can actually reach that point.
### [[Certification and Authentication]]
One way to establish security is to identify the two parties attempting to communicate, and then to encrypt communication between them such that others cannot intercept the message.
[[SSL]] is an implementation of certification and authentication.
## Related
- [[Your connection is not private]]