--On Monday, February 03, 2014 14:02 -0500 "Dale R. Worley" <worley@xxxxxxxxxxx> wrote: >... > So I think some thought needs to be put into what can be done > to thwart pervasive monitoring when the information to be > concealed is the identity of the endpoints. I completely agree. I just think it is a mistake to become so obsessed with metadata monitoring (what in PSTN land was often known as "pen registers" that we ignore data confidentiality. Similarly, I think it would be a mistake to become so concerned about the Final Ultimate Solution To Confidentiality Problems that we stop doing what we can to make known, existing, strong confidentiality from working effectively and/or better. In the particular case of metadata/ pen register data it is probably worth remembering that the most common reason for collecting such data is to figure out which conversations to try to capture in more depth, i.e., actually intercept and review content. Let's not ignore either threat. john