Quote:
Originally Posted by Krystian Galaj
What would that help, if they only store the sender and recipient?
|

I missed the "only store sender and recipient." But traffic analysis is bad enough! Time to fight back!
Everybody ready? After me:
Spam, spam, spam, spam
Spam, spam, spam, spam
...
More seriously, the only counters to traffic analysis that I am aware of involve either disguising the real message and hiding it amongst an avalanche of garbage or using a broadcast technique to avoid disclosing the identity of the recipient. And both of these counters have their own problems.
If you really care, read some good books on crypto and on security (in the broad sense rather than just "computer security."
I suggest that it's time for our UK brethren to "really care."
Xenophon