Hiding-in-Plain-Sight™ technology allows Polynom to operate securely (i.e., equivalent to a Type 1 Cryptographic device) on compromised networks, servers, and/or in hostile countries. Polynom achieves this by using various techniques to disguise its traffic and make it difficult to block or intercept.
For example, Polynom disguises its traffic by adding random noise to the lengths of requests and responses. This makes it difficult to write firewall rules based on the fixed lengths of different messages. Polynom also uses varying techniques for masquerading traffic as different Internet-standard byte patterns. This makes it even more difficult for inspection techniques (e.g., deep packet inspection) to identify and block Polynom traffic.
The only non-encrypted packets that Polynom uses are called control messages. These messages use random bytes and modulus math to transfer understanding across the network. This ensures that even if a control message is intercepted, it will be difficult to understand its meaning.
In addition to the techniques described above, Polynom utilizes advanced post-quantum encryption (AES-256-GCM, ML-KEM-1024, ML-DSA-87). These techniques make Polynom one of the most secure communications platforms available.
For further information, see: How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic.