Tech moves fast! Stay ahead of the curve with Techopedia!
Join nearly 200,000 subscribers who receive actionable tech insights from Techopedia.
There are several methods for traffic-flow security. One involves the use of dummy traffic in addition to the encryption of actual messages, and sender and receiver addresses. This can make it look like a system is experiencing a consistently high level of traffic in order to obscure the actual volume of traffic in the network. Another option is to send a continuous encrypted signal even when a network is not being used.
The principle behind traffic-flow security shows how businesses and other parties may guard even seemingly basic data such as the date and time that someone accesses a platform, or when they send a message. In some situations, this data is not regarded as necessarily private; in other cases, it may be necessary to hide traffic on a platform where knowledge of access times and traffic levels could be used inappropriately by an outside observer.