Obfuscation

Learn how to secure your app through obscurity.

We'll cover the following...

Obscurity

Have you heard the phrase: security through obscurity? It’s rarely true, but in some cases, helpful. Most applications use an ID field in each table as a primary key. This ID is then used throughout the system to access data. It is passed through URLs, forms, and APIs to denote the needed piece of data.

Sometimes, you don’t want to expose the user to the actual row ID. Maybe ...