• Bogasse@lemmy.ml
      link
      fedilink
      English
      arrow-up
      6
      ·
      4 days ago

      To sum it up even more : this looks like standard end-to-end encryption, but any app user have the same network traffic, completed with fake data if no communication is needed.