How did that work out for them? It took about 24 hours for their entire exploit to be entirely analyzed. Rule number one of secure programming is the less code you have the better. Security via obscurity is an oxymoron.