The problem is not realy that encrypted data can be seen as encrypted but that metadata (source and destinatiion pubkey) is available. With these information, you can construct a social graph.

Reply to this note

Please Login to reply.

Discussion

No replies yet.