How ?

It is based on state-of-the-art operating systems, internet communication software and encryption protocols, free/open source software licensing, and open expert review processes.

But the core innovation are processes and tools through which the user-verifiability of the integrity of a server room against tampering through legal or illegal access to the server room, is guaranteed in ways similar to the management of ballot boxes during good-old paper based elections, based on the constant presence of at least 5 individuals that are randomly-selected and/or with conflicting interests.

If a court order is issued for the acquisition of certain logs or information on a user of the service, the authority would be given physical access to such specific piece of information, at the presence of 5 randomly selected users. This way it enables the efficient prosecution of investigations on suspected crimes by users of the system on the basis of evidence acquired externally.

True, there is a possibility that even the strongest and longest standing protocols may have been broken by some powerful third party through undisclosed computers and algorithms, but it is a "very" remote possibility for a host of reason. Therefore, once the technology is realized and properly tested by experts and crackers, we'll advise its use for private social and political communication.