Secret interactions come innocent if they are camouflaged by open connections