All comms are subject to traffic analysis except surreptitious, covert channels (which can't be covert if the implementations are widely available).
All comms are subject to traffic analysis except surreptitious, covert channels (which can't be covert if the implementations are widely available).