1. Stop them from gathering information :
A) Encrypt every email and message with massive decryption keys.
B) Modify browsers and websites to do this automatically, why :
A) Encrypt every email and message with massive decryption keys.
B) Modify browsers and websites to do this automatically, why :
Because Web browsers would encrypt all typed messages and data uploaded by a user.
Once the data reaches another user who can decrypt it, then the other user's browser or server would then decrypt the data and download it.
As for the second part, lets say we had three computers: A, B, and C
A ------------- B ------------- C
Data,whether it is encrypted garbage or actual data, is always sent from A to B to C to B then back to A
A ------------> B ------------> C
A <------------ B <------------ C
If you try to wire tap any location, you can't tell if the data is junk or not and you also can't tell if the data is being sent from A to B or A to C and so on for each member in the network.
Web browsers would send data along network lines constantly, having users download random garbage or other people's encrypted messages to their computer then pass it along to the next.
Once the data reaches another user who can decrypt it, then the other user's browser or server would then decrypt the data and download it.
As for the second part, lets say we had three computers: A, B, and C
A ------------- B ------------- C
Data,whether it is encrypted garbage or actual data, is always sent from A to B to C to B then back to A
A ------------> B ------------> C
A <------------ B <------------ C
If you try to wire tap any location, you can't tell if the data is junk or not and you also can't tell if the data is being sent from A to B or A to C and so on for each member in the network.
Web browsers would send data along network lines constantly, having users download random garbage or other people's encrypted messages to their computer then pass it along to the next.
C) Even with the best computers, they can't decrypt well encrypted data.
2. Stop them from recording META DATA :
A) Create network paths for files to move through any part of the Internet.
A) Create network paths for files to move through any part of the Internet.
B) The encrypted file is stored and sent to every computer along the path until it reaches the one computer that can decrypted it.
C) When useful files are not being sent, always send encrypted garbage files through the network
D) This way recording files transfers won't amount to anything since every computer will be receiving data along the chain and the security agencies can't tell the junk from the real since both are encrypted
E) Modify browsers and websites to do this automatically
If you can set these two things up, along with a perfect firewall, then security agencies, or whoever want to gather your information & data, is and will virtually useless.
C) When useful files are not being sent, always send encrypted garbage files through the network
D) This way recording files transfers won't amount to anything since every computer will be receiving data along the chain and the security agencies can't tell the junk from the real since both are encrypted
E) Modify browsers and websites to do this automatically
If you can set these two things up, along with a perfect firewall, then security agencies, or whoever want to gather your information & data, is and will virtually useless.