Consider a sender and a receiver as two distant nodes in a network. The sender wishes to transmit a secret to the receiver, but faces an adversary controlling an unknown set of nodes. We characterize the directed networks for which there exist \epilson-secret and \epsilon-strongly secure...