"The meta data" is the gold. It tells more about of than the actual transcript of our calls. It is how we are watched and tracked and it is why our data is so valuable right now to commercial users who want to sell us things, and to our opponents in this multi polar information war.
>Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication, which can be performed even when the messages are encrypted.[1] In general, the greater the number of messages observed, or even intercepted and stored, the more can be inferred from the traffic. Traffic analysis can be performed in the context of military intelligence, counter-intelligence, or pattern-of-life analysis, and is a concern in computer security.
We can tell everything about an individual without ever knowing our name. Where we shop, how we vote, or if we vote and why. If a subject is of extreme interest the meta data can be used to identify an individual.
There's no reason to care about real world identities. We don't need to know someone's name to manipulate their news feed and provide specially prepared media content.
Media news content can make us angry or sad, stimulate us sexually, make us recall old grievance, encourage us to drink or take drugs, make us more threatened by or less conscious of race, religion or economic status.
To defeat traffic analysis and remove the possibility of this type of control of anybody by anybody else we need a specific type of advanced network.
An identity based secure network which use a series of specially configured servers called a mix net which scramble the data of millions of users encrypting, mixing routing data through multiple, re mixing and encrypting at each stage making it impossible for an enemy to determine where any message came from, defeating "traffic analysis."
https://en.wikipedia.org/wiki/Mix_network
The former data limitation of mixnets has no been largely overcome.
But mix nets are only one component of a secure information distribution system that will prevent the most widely used surveillance.
The chief component of a secure network is identity. We need a single, permanent lifetime identity in virtual space for the same reason we need one in the real world. For the same reasons. If our friends or neighbours could appear to be someone else we would not know who to trust. We'd be surrounded by shapeshifters with no fixed identity.
Sound familiar? That's what the internet is right now. That's because on an anonymous insecure network it is possible to spoof credentials and present a convincing and deceptive appearance to cheat and manipulate others.
We need a single permanent life time identity -but we also need anonymity. There are lost of good reasons for someone to want to be anonymous. To make a gift. To blow the whistle on crime. To show and pay for things without giving your real world identity to a merchant who will sell it to others.
On the secure identity based network it is possible to do everything anonymously - credentials can be split many ways. If a users wants to over evidence of expertise in their field we can do so without revealing any more ourselve. "Played violin professionally" or "licensed crab boat captain" or Doctor of Divinity degree.
Networks are not secure for anybody until they are secure for everybody.
We need to build the information system of the future as an international engineering project, so the safety and engineering are open to all the nations who will depend on this infrastructure to support civilization.
We can not allow an enemy to capture our information systems again. The way to prevent this happening is to make the network a public utility owned and controlled by users used to provide media content provided by trusted individuals or companies, unmanipulated by anyone else. Secure for all, because it is secure from all, even the people who build it.
The cult has until now controlled our information supply. They used it to star the first world war.
https://www.tabletmag.com/sections/news/articles/karl-kraus-145-fake-news
The cult control by symbols, images and music, it uses whatever media exist. The cult will be able to do this as long as we continue to use anonymous, insecure-by-design communications networks like the internet.