Overview#Information leakage happens whenever a system that is designed to be closed to an eavesdropper reveals some information to unauthorized parties nonetheless.
For example, when designing an Encrypted instant messaging network, a network engineer without the capacity to crack Encryption codes could see when messages are transmitted, even if he could not read them.
More Information#There might be more information for this subject on one of the following:
Add new attachment
Only authorized users are allowed to upload new attachments.