Receiver costs
Vulnerability to predation while inspecting or comparing signals
Time lost
Susceptibility to exploitation, i.e. code-breakers
Previous slide
Next slide
Back to first slide
View graphic version