for a moment, let’s assume those are rumblings of man worn out by pulling couple of all-nighters in one row.
we have to assume that security intelligence services will want to listen to everything and everywhere. that includes NSA sniffing all traffic in major interconnection points at largest service providers. and, obviously - we don’t like it.
why we can’t get back to original idea, that all point to point communication should be protected by IPsec (ALL COMMUNICATION). widely deployed IPv6 with devices that will support it makes this possible. the fact that nowadays even small devices can encrypt traffic at very high speeds helps. one of the less known IPsec discussions before standarization, was idea that nodes using IPsec should constantly generate traffic - but not exceeding available link bandwidth (to avoid buffer bloat). service providers generally removed data caps (apart from mobile operators - which may change after migration to LTE). our sniffers can’t record all of this traffic, and decrypting IPsec traffic is unfeasible to say the least. you can’t also selectively record, as all is encrypted. will intelligence agencies have money and power to break AES? well, not now, but let’s say it will be possible in near future. but your idle device is anyway generating gigabytes of random connections to fill up the link (of course there’s question of how analytics and statistical traffic monitoring can help select only interesting pairs, but given programmers invention i bet it’s doable with some level of effort).
...