300
of traffic flows (presence , absence, amount , direction and frequency . 2 . Analysis
of all encrypted messages sent over the communication system does not lead to
decrypt , but allowing the opponent and / or the offender obtain indirect
information about the transmitted Post and generally observed on the functioning
of the communication system . A. that uses features of registration messages
encrypted , and their length , the transmission time , the data sender and recipient ,
etc.