The problem is not realy that encrypted data can be seen as encrypted but that metadata (source and destinatiion pubkey) is available. With these information, you can construct a social graph.
The problem is not realy that encrypted data can be seen as encrypted but that metadata (source and destinatiion pubkey) is available. With these information, you can construct a social graph.
No replies yet.