I missed the part where encryption could sometimes become the cause for search. Could you point it out, please?What I did see was where anonymization/VPN/Tor would be a trigger for application of this procedural amendment.