Use shared WiFi Use public VPN Use Tor network with multi-node Use SSL sites when entering personal information admin See author's posts Post navigation Ricardo wants to send secret messages to a competitor company. To secure these messages, he uses a technique of hiding a secret message within an ordinary message. The technique provides ‘security through obscurity’. What technique is Ricardo using? Which of the following will perform an Xmas scan using NMAP?