Undetectability of a message requires that it be indistinguishable from 'random noise' — an attacker cannot sufficiently distinguish whether the message exists or not. This is distinct from anonymity, which protects only the relationship between an IOI and a subject, not the IOI's existence itself. Undetectability is possible only for subjects not involved in the IOI; senders and recipients cannot achieve it against each other.
From 2010-pfitzmann-terminology — A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management
· §6
· 2010
Implications
Circumvention traffic must be statistically indistinguishable from background noise or a plausible cover protocol — high entropy alone is detectable if it stands out from normal flows; design for undetectability, not merely anonymity.
Achieving undetectability requires making message existence invisible, not just hiding sender/recipient identity; this demands dummy traffic or steganographic cover channels rather than encryption alone.