Technically you could piggy back on another protocol and obfuscate your comms. Like piggy backing in an envelope across https connections from server to server. Nobody is looking there. And even if they are, good luck decrypting that. Looks like a legit site but it is actually a proxy for delivery encrypted payloads.
reply