Security by obscurity, yawn
It's difficult to work out what this article is trying to tell us. If I understand it correctly there is a theoretical possibility that vulnerabilities can be determined by public traffic analysis. Is there any evidence it has happened? At least everyone knows the potential weaknesses.
What does security by obscurity offer?