The correct option is:
Unsafe, because they rely on security by obscurity.
Proprietary protocols and data formats often rely on security through obscurity, which is not a robust security approach. This method assumes that hiding details of the protocol will prevent attackers from exploiting vulnerabilities, but this is generally insecure because once the details are discovered, attackers can target the system.