I seem to recall several people saying that the compression/encryption plugins will only encrypt items, and not the filesystems metadata. And then saying that this might be useless for their purposes, because being able to see the filename might be enough for the attacker.
However, I don't think that is correct. The only thing visible to an attacker would be the tree structure, not the item, which contains the directory information including the filenames. So at most an attacker would be able to browse the tree structure, and see the keys used and the size of the item pointed to. If this is true, selection of a good hash should entirely prevent the giving information away problem, leaving only useless key->size->location data for an attacker. Is my understanding correct?
