Traffic analysis derives intelligence from communication patterns — even from encrypted traffic. Timing, volume, frequency, and communication partners reveal information regardless of encryption.
Encryption protects content but not metadata. Intelligence agencies exploit traffic analysis at scale. Tor attempts to defeat traffic analysis via onion routing. Even encrypted VPN traffic reveals when you're active.