The application truncates the display, recording, or processing of security-relevant information in a way that can obscure the source or nature of an attack.