Security in the Dark: Recognizing the Signs of Hidden Information