On 4/11/06, Tyler Durden <camera_lumina@hotmail.com> wrote:
... Interestingly, I'd bet we can guess as to how much gets pulled back and how much gets dropped at the POP, but it would take some work.
this would be a fun exercise. i wonder how much dark fiber is truly "dark" these days...
Another point that was made years ago on Cypherpunks is that the presence of crypto "where it doesn't belong" is probably a very high risk indicator. In other words, if your sender IP isn't some bank or big company and you're using crypto, they probably grab ALL of that and send it to high-cost processes.
a friend and i had a discussion on this very subject recently. if you don't mind the social network analysis but desire privacy of content, does it matter if your encrypted comms stand out assuming they can't break the cipher? strong anonymity against an NSA threat model is very difficult; sometimes privacy of content is sufficient. in any case, i'd like to see encryption become the norm for even trivial communications. like the Azureus enhancements Steve mentioned this can be done in a simple and intuitive manner - it will just take a lot of effort...