This has the unfortunate effect of providing plenty of meta data, and a tool for Them to lock you up until you decrypt your communications.
Or you encrypt the communication and use some form of anonymous remailer, hoping that these haven't been compromised by Them.
Another disadvantage of both methods is getting more people using good encryption, and making sure they do so correctly.
This has the unfortunate effect of providing plenty of meta data, and a tool for Them to lock you up until you decrypt your communications.
Or you encrypt the communication and use some form of anonymous remailer, hoping that these haven't been compromised by Them.
Another disadvantage of both methods is getting more people using good encryption, and making sure they do so correctly.