Network Traffic Flow analysis protection enhances encryption
Within a commercial setting, it is the analysis of large volumes of metadata, and the insights that can be gleaned from this analysis, that is likely to be of greater concern. Ducklin does a good job here of illustrating the risks and the types of insights that can be extracted from a detailed analysis.