• Bogasse@lemmy.ml
    link
    fedilink
    English
    arrow-up
    6
    ·
    5 hours ago

    To sum it up even more : this looks like standard end-to-end encryption, but any app user have the same network traffic, completed with fake data if no communication is needed.