randomOVDB#2 is correct about encryption.You fellows are thinking of encryption in the sense of 'your encryption' strength being strong enough to protect you. That's a factor, yes, if the adversary cannot break your encryption they can't read the message.But look at the bigger picture. What if the enemy does have power to break your message? Then the only thing that protects you is the sheer volume of messages. If all messages contain "goodies", then the enemy has an incentive to throw resources at you.If the enemy knows that many of the messages will be non-actionable intelligence, then they are greatly deterred from targeting you as a result.Remember, eventually most 2048 bit PGP encrypted messages (most PGP public keys I have in the GPA are 2048 bit) could be decrypted with relative ease in 20-30 years time. In fact those are probably crackable today if you were interesting enough to a powerful organization like the American's NSA or Russian's GRU. The question then becomes whether it is *economical* to do so. If some messages are actionable, and others are junk, then LEA's job becomes a nightmare. If they are all goodies, then it could become an intelligence goldmine instead.Quote The literal definition of anonymity is a state of namelessness. A more technical definition of anonymity is the state of being indistinguishable from a given set size. As an example, imagine a closed communication interface with several hundred members. If all of the members use the name 'anonymous' to make their posts, they are indistinguishable from each other based on naming information (however, they may not be anonymous based off IP information). However, they are not indistinguishable from those who are not a part of the system. If two people have access to an anonymous suggestion box, any suggestion in the box may be anonymous but the set size is two. The higher your set size is, the more anonymous you are. Anonymity networks attempt to create a substantial set size for your Internet communications. A user of a given anonymity network can generally be narrowed down to the set size of all users of the network (however, it may be difficult for an attacker to determine all users of a given network), but the network attempts to make it difficult for an attacker to narrow the source of a given communication to an individual who put the communication into the network. Thus, the network attempts to give its users a set size larger than one, hopefully large enough to prevent actionable intelligence. -- Project PolyFrontAnonymity and encryption can be symbiotic, but in both cases the odds are considerably improved by increasing the set size. Increase the set size by encrypting everything possible, increase the entire community's security level and most especially your own. You become "hard" nut to crack in the eyes of a LEA.--Some of you say it is uneconomical in terms of time as a vendor to encrypt everything. I am very familiar with the experience of dealing with many encrypted messages at once. I also know that if I concentrate I can clear my inbox in a much shorter period of time than if I dilly dally, there are techniques for speeding up your efficiency here that ought to be familiar to any secretary in the world. I'm not accusing anybody here of being lazy, but perhaps I am accusing you of being a bit inefficient than you ought to be.For one thing, if you don't type > 50 wpm with close to 100% accuracy, you should think about enrolling in a typing course online or at a business course offered in your community to increase your typing speed. This will pay dividends over time which makes the opportunity costs more than a good investment. Vendors that respond promptly snatch much business from slower vendors.Secondly, if this does not solve the issue for you as a vendor, then the chances are that your operation is expanding rapidly and this time constraint you're running up against implies you ought to be making new hires to expand your business. Ideally a relative or very trustworthy friend of similar ethic origin i.e. deeper than usual ties, who is in a different time zone in order to maximize the advantages. A so called 'tag team' is an extremely good idea on a multitude of levels when it comes to geographical arbitrage in our markets. Even within the States you can at least double your total ROI this way. e.g. 1 in NY, another in Cali. Anyway, back to main point:I get up to 50+ encrypted messages per 24 hour cycle, at a minimum. It is easy to decrypt them all at once by invoking a simple command line argument. It takes less than 60 minutes to respond to them because I employ a division of labor policy with my messages. I adopt generic messaging or templates appropriate for standard situations, which accounts for 90% of the mail anybody here receives, most especially if you are a vendor. I can then contextualize those generic emails very quickly by appending answers to unique questions as part of the generic template.Work smart, not hard. That is what I'm trying to say here, because you can make a lot of work for yourself as a vendor if you don't employ a wildcard while decrypting messages or you are a slow typist.