hiro wrote: > try with a small group of people first that actually has a need for privacy.
Heyho, in the special case where this privacy is to be achieved not with encryption, authentication and authorization (to limit the number of entities who are allowed to learn the secret which should be protected), but with an anonymity/pseudonymity system (where actions are not attributable to the actors identity), be aware that it is not a good idea to use this system only if you need it. It would be too easy for third parties to filter all the users of the system out and assume everyone of them has something to hide. An anonymity system needs users who don't actually have a reason to use it. This is why the NSA or other investigation agencies don't have their own anonymity system to spy on their targets (they could be blocked relatively easily), but also use the more widespread systems like Tor. If you want to know more, research "cover traffic" and "anonymity set size". --Markus