“Cloaking” is a feature of remote.it is best illustrated by what happens, for example, at AWS. At AWS there are Security Groups, see https://docs.aws.amazon.com/vpc/latest/userguide/VPC_SecurityGroups.html.
With remote.it installed on an AWS VM, for example, your AWS Security Group could use a rule that denies ALL inbound traffic on ALL ports for ALL protocols. Your AWS VM is now “cloaked”. Nobody can scan your “cloaked” VM, nobody can even see that your “cloaked” VM exists because there is no response to any incoming traffic.
Then, remote.it handles your connection to this “cloaked” VM using a remote.it service (using ssh for example) because remote.it establishes connections using outbound traffic from the “cloaked” VM. For example, you could use a firewall rules that similarly cloaks a camera, a wireless basestation, a server or any device using remote.it.
for additional details.