The answer for me was giving up on most privacy. I gave up in
   2002 after Google exposed my early 1990s Usenet posts for easy
   searching. At its root though, the Internet was never designed
   for security. It's a store and forward system. Store and forward
   means "copy and send copy". There's always multiple copies of
   everything continuously. Want to break into someone's system?
   Forget all the high math cryptography methodologies. Kidnap
   their family until they give you the passwords. The systems can
   never be fully secured as they stand. == If you want security,
   don't use the Internet. It's not, never will be, and cannot be
   secured. The flaw is fundamental. The very processes that cause
   it to function at ALL (as opposed to NOT being networked) is
   ALSO WHY it will never be a secure medium for information
   transmission. All humans can do is keep closing gaps as they're
   found, just for a clever one to find new ones. The bucket will
   always leak and never be plugged. It's the nature of the beast.
   The tradeoff for all the wonderful goodness it gives us. ==
   Precisely. But it's using uncommon channels even over public
   networks. You're talking about buring the signal within the
   noise. The thing is, we're getting more and more clever at
   focusing on retrieving faint signal within noise when bundled
   together. But a lot of this speaks of my personality: Back in
   1999-2002, I did a lot of investing. Through trial and error, I
   found a methodology that works for me. I found out it even has a
   name: contrarian investing. See what the bulk is doing, and look
   in the opposite direction at the stuff they've neglected or are
   running away from at full speed. People right now are running
   TOWARDS qubit math, incorporating chinese remainder theorem and
   all sorts of folding, tearing, swapping, shifting base systems,
   and all kinds of math tricks. But what about sparse information
   distribution? Staggered timing? Hiding in old documents? These
   are all well-worn methods for hiding your trail of information
   but because they're not in bundles, neatly packed and utilizing
   standard protocols but require human intervention and
   creativity, these simple techniques make it harder to trace. ==
   Well, that's all you need is time. Once messages are received,
   they're no longer needed. I ran a Minecraft server from
   2012-2014 for my elementary age nephew. It got very popular,
   gathering 27,000 unique players and had a ongoing userbase. Felt
   bad shutting it down honestly but it was killing my laptop.
   Anyway, I let them do whatever they wanted (creative /
   roleplaying) and I kept only a loose eye on things, to make sure
   there was no sexual harassment or bullying 'cause there were
   people of all ages on it, and I allowed ppl their privacy as
   much as possible. I was a friendly "serverGod" but those who
   knew that I could theoretically see all the chat on the system
   (I rarely looked at it because I was busy) had a clever message
   passing method they used: They'd write notes in a book, using a
   pre-established code, pass the book, then throw it in lava after
   being read. They bragged about it of course. Still, quite
   clever. Foolproof? No. But it was the speed of transaction and
   deletion that was clever. It left no permanent log file traces.
   == I'd focus on auditing systems myself if I was worried about
   security. Any history trails generated during the process. For
   example, I have all of the chat logs saves from 25 months. I
   could search through and easily find Skype names, email
   addresses, phone numbers, real names, Kik account names,
   locations (kinda - that depends on their ISP), youtube accounts,
   etc. I could even pull a WikiLeaks on them all and release them
   publicly but of course only they'd care. Still, a virtual world
   is a microcosm of the real world. For myself, I use my real
   name. Everywhere. I pump out information, knowledge and opinion
   freely and my throw up is ALL over the Internet. Google me. I'm
   EASY to find. You can find my home. Is anybody going to find me
   and take me away? No. I talk so much that I'd be too boring to
   bother with. == and actually, I did do an Eye of Sauron on them
   once. I have several Gigs worth of chat logs and one day, out of
   boredom, I extracted all of the youtube accts I could and
   subscribed to them all. As a nice server God, they appreciated
   my occasional thumbs up on their videos, and even two years
   later, some of them still follow me around the 'net and it's
   kinda flattering. Honestly,- there's a LOT of freedom in being
   an "online persona of yourself". I use my real name. Is that
   really "me" that you see out there? No. The real me is sitting
   in an ugly yellow chair on a back porch. I'm a fiction of
   myself. I even registered my own NAME as a fictitious name a few
   years ago to make it legitimate with the Florida fictitious name
   database. $50 for a little poetic fun. I even created a circular
   fictitious name chain so that I ended up so that I am LEGALLY:
   SOMEBODY owned by NOBODY I don't use any of it for evil
   purposes. But I like knowing how to do it. == I get accused of
   working for foreign agencies sometimes. Here's one from just two
   days ago: I've been uploading Vines I've been making to the
   Internet Archive. They were nice enough to give me my own
   collection because I was clogging up the community collection.
   This one user, Noah, was getting REALLY MAD about my massive
   uploads to the system. I had it all pre-prepared ahead of time,
   Metadata already filled in, the MP4s all ready, everything FTP'd
   to the upload staging area.... and then I set my browser to open
   each of the url submissions one after another, spaced 3 seconds
   apart. boom boom boom boom boom - thousands of them one after
   another. Anyway, at one point during a forum discussion where he
   was complaining he says this: "If I were to attempt to
   experiment on the best way to not so much shut down but
   effectively block a MASSIVE site like - - - oh say, gee I dunno
   - - - - a government agency (?) what better way to rehearse than
   here?" He said a few other things like that, but he was
   CONVINCED that I was attempting to shut down the Internet
   Archive with all of my uploading. Oh! And he was sure I wasn't
   working alone. But, I am. tongue emoticon ==