Are there any advanced security technologies, for example, establishing a secured connection, which first require authentication based on security through organic-like changing obscurity of secrecy?
I'm not a fan of "regular" security through obscurity, because hackers will eventually discover and bypass the vulnerabilities of "obscurity".
But what about security through an adaptive, changing, updating organic-like obscurity based on secrecy?
What this means is that the security is relying on infinite intelligent-like unique obscurities which will always update for a given time period, regardless of being hacked or not.
It's like organic software fighting off hackers (viruses), a living breathing organism that is alive and adaptive, ** it's not static anymore**.
The organic-like obscurity will always change on a daily basis.
This means that hackers are now required to reverse engineer the obscurity algorithm on a daily basis. This also means hackers are now behaving like organic viruses and will be extremely hard for them to reverse engineer the organic-like self-changing obscurity based on secrecy.
Which also means, if hackers found out vulnerabilities of obscurity, it's completely useless since tomorrow the discovered obscurity will change again and will be more complex and is required to reverse engineer again. No AI can do reverse engineering in a practical manner and no hacker is going to waste hours and years for reverse engineering organic-like obscurity based on secrecy.
I can have a team of software engineers to do this, but has anyone ever done or thought of doing this before? I bet the future of web security is going to be based on this concept.
Today there are thousands of companies providing smart AI detection of malicious activity and various security vulnerability detection but I do not think they design the security system which adapt or change due to AI's decisions.
There are no global authoritative standards that give a practical solution of implementing security through "organic-like" obscurity based on secrecy for simple secured communication between client and server to prevent man-in-the-middle attacks.
Various algorithmic "secrecies" need to be implemented by the programmers following guided rules required to make a strong obscurity which will be difficult for hackers to reverse engineer in a short period of time before it self updates.
Obviously, a "trusted" programmer is required and will be needed to tweak and update the secret algorithm once or twice a week to maintain valid and strong security through organic-like obscurity which adapts daily.