Hiding-in-Plain Sight™ technology allows Polynom to operate securely (i.e., equivalent to a Type 1 Cryptographic device) on compromised networks, servers, and/or in hostile countries. Polynom achieves this by using various techniques to disguise its traffic and make it difficult to block or intercept.
For example, Polynom disguises its traffic by adding random noise to the lengths of requests and responses. This makes it difficult to write firewall rules based on the fixed lengths of different messages. Polynom also uses varying techniques for masquerading traffic as different Internet-standard byte patterns. This makes it even more difficult for inspection techniques (e.g., deep packet inspection) to identify and block Polynom traffic.
The only non-encrypted packets that Polynom uses are called control messages. These messages use random bytes and modulus math to transfer understanding across the network. This ensures that even if a control message is intercepted, it will be difficult to understand its meaning.
In addition to the techniques described above, Polynom uses various other techniques to protect its traffic, including PQC CRYSTALS Kyber-1024 exchanges resulting in AES 256-bit keys. These techniques make Polynom one of the most secure communications platforms available.
For further information, see: How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic.