end-to-end encryption is great and all but be wary. It is not immune to traffic analysis. The ideal for encryption is to look random and that should go for circles of people as well. The Allies used the technique of false radio messages as well in WW2. Read up on Operational Research (As the British boffins called it)