That's not what "security through obscurity" is about. The admonishment against "security through obscurity" in cryptographic circles is about not relying on your adversary's ignorance of your systems to protect your secrets.
So, for instance, if you are using cryptography to secure a transmission, you don't rely on eavesdroppers not knowing what algorithms and protocols you are using. You rely on them not knowing your keys.
So, for instance, if you are using cryptography to secure a transmission, you don't rely on eavesdroppers not knowing what algorithms and protocols you are using. You rely on them not knowing your keys.