Which Method Will Render Useless Data Captured By Unauthorized Receivers