Some aspects of security of chaos–based communications