How would you describe a simple yet very effective mechanism for sending and receiving unauthorized information…?