Description
This option hides the receiver of the encrypted data as a countermeasure
against traffic analysis.
It slows decryption, however, since in the worst case all the keys on
a receiver's private keyring must be tried to find the decryption key.