They copy every packet, that's how they broke TOR when they took down Silk Road. Theoretically you can encrypt stuff that they can't decode, but they still know where it came from and where it went to.
For that not happening I have an easy solution. I have not published it since 2006 when I discovered it.
The task is that they do not know who is sending what to whom.
A hint; Cascading encription with at least 2 post offices.
They copy every packet, that's how they broke TOR when they took down Silk Road. Theoretically you can encrypt stuff that they can't decode, but they still know where it came from and where it went to.
For that not happening I have an easy solution. I have not published it since 2006 when I discovered it. The task is that they do not know who is sending what to whom. A hint; Cascading encription with at least 2 post offices.