then even if we reveal information, adversaries may still assume (likely correctly) we aren’t sharing all our information
I think the same reasoning applies if they hack us: they’ll assume that the stuff they were able to hack was the part we left suspiciously vulnerable, and the really important information is behind more serious security.
I expect they’ll assume we’re in control either way—once the stakes are really high. It seems preferable to actually be in control.
I’ll grant that it’s far from clear that the best strategy would be used.
(apologies if I misinterpreted your assumptions in my previous reply)
I think the same reasoning applies if they hack us: they’ll assume that the stuff they were able to hack was the part we left suspiciously vulnerable, and the really important information is behind more serious security.
I expect they’ll assume we’re in control either way—once the stakes are really high.
It seems preferable to actually be in control.
I’ll grant that it’s far from clear that the best strategy would be used.
(apologies if I misinterpreted your assumptions in my previous reply)