Are you volunteering your services, or just trying to educate the masses? Speaking for myself only, I have no idea what you're talking about. Then again I freely admit my ignorance and general lack of interest in all things computer. Perhaps you should PM an admin or two and get more directly involved in the process. All it will take is some of your time and effort. Do you have any to spare?
I updated the text of my post a bit, because I realized I left out an important point after I mentioned Kerckhoff's Principle.
In any case, I'm
not a web dev. My coding skills lie in embedded applications/systems development and process control systems. So, long story short I'm not volunteering my services in helping fix up FA's code.
What I am trying to do is educate the masses, somewhat, in a topic which has been known in the cryptography circles since 1883. Namely, never to have the security of your system be reliant upon the function of the system remaining secret; rely on the strength of the algorithms the system implements for your security. We have a wide corpus of work showing how relying on security through obscurity simply
does not work (see: the German Enigma cipher of WWII fame; which was broken so hard the Germans couldn't even believe it after they were told about it at the end of the war). The variety of Linux and BSD systems show this, their codebase is free and open, and you most often only see exploits on those systems occurring in closed source "binary blobs" from third party developers. OpenBSD, like I mentioned, is known to be extremely security focused, and there are many commercial entities who use software and code written in the OpenBSD project in their products. (Example: The Core Force firewall for Windows is essentially a straight port of OpenBSD's
pf firewall. Microsoft's own Windows Services for UNIX (and it's derivative Services for UNIX Applications) are built on OpenBSD code as well.)
So to TL;DR my point, I'll just quote the preeminent Claude Shannon: "one ought to design systems under the assumption that the enemy will immediately gain full familiarity with them".