I think documenting this sort of thing would be useful. I think it is more often called covert channel analysis or examined under the heading of privacy implications of protocols. I do not have time to actively work on the project, but I do think that we could significantly benefit from work in this area. _______________________________________________ Ietf@xxxxxxxx https://www1.ietf.org/mailman/listinfo/ietf