RE: https://chaos.social/@delta/115842446685941927
Encrypted content / headers / transport / etc. are great harm reduction, but by no means is it metadata avoidance (in the strict academic sense of what those words mean when applied to communications systems).
Third party actors (e.g. relay servers / network actors) can build correlative models using the *metadata* inherent in the communication protocol (source, destination, timing, frequency).
We have decades of research demonstrating the power of such models - let's not minimize them.
