In theory the person running this protocol can just calibrate their settings until they are comfortably flying under the radar. You could make the "messages" less frequent which means someone trying to log the traffic will consume more bandwidth (increase the cost to log it) & tweak the algorithm to make it consume more CPU to decode/encode (making it difficult to "try" all the combinations of traffic to see if they happen to decode into something that matches a heuristic for a hidden message). Given a sufficiently large enough amount of "cover" bandwidth to hide in, and assuming your message is sufficient small, you'd be impossible to detect. Pretty brilliant.
Maybe the vibrations of our universe in "string theory" are some sort of message, too ;)
Maybe the vibrations of our universe in "string theory" are some sort of message, too ;)