A technique for cloaking events could also show a way to make computer networks more secure.