<div dir="ltr"><blockquote style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex" class="gmail_quote"><br><br>Can you give an example of where it actually worked out well?<br></blockquote><div><br><br><a href="http://arstechnica.com/security/2014/07/crypto-weakness-in-smart-led-lightbulbs-exposes-wi-fi-passwords/">http://arstechnica.com/security/2014/07/crypto-weakness-in-smart-led-lightbulbs-exposes-wi-fi-passwords/</a><br><br></div><div>it was a system that didn't even involve a key exchange protocol!<br><br></div><div>too bad security by obscurity does not work <br></div></div>