You seem to underestimate the inventiveness of a superintelligence, and the diversity of hardware controlled by computers, and our reliance on them. It is also possible to use electronic communication to make humans do work for you.
Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
Remind me again which pirate was sentenced to death
Captain Jack Sparrow.
SMTP requires that those fields be world-readable. Or do you propose that SMTP servers somehow route email to the appropriate recipient without being able to read who the recipient is?!
No, what I propose is that we start using a protocol other than SMTP for email. I don't think such a protocol exists yet, and I don't know much about how it would look, but I think AC #49126801, right above, has some good ideas.
- Message length
- The fact that a message was sent.
In short, everything except the fact that you're using the system.
Surely they'll find it very difficult to get an unregistered SIM card.
No, but they'll find it difficult to get unregistered cards to work, at least once the networks start blocking all cards that are not registered.
The counter to that is to steal registered cards. The counter to that is to report the cards as stolen. Counter: kill the card-owners, so they can't report the cards. Counter: police de-registers cards belonging to dead people. Counter: kidnap/disappear the card-owners. Only works until the authorities catch on in each individual case. Mitigation: keep kill/stealing. That's what terrorists do anyway, so no problem there. Problem: you're now switching numbers often. Gonna be difficult to keep your address book up-to-date.
All modern operating systems put restrictions on what software can run on them and what it can do.
No, they don't. Windows, Linux, the BSDs, OSX, none of those have any mandatory filters. Windows and OSX have some "anti-malware" crap, but those can be disabled.
Even on Linux your app doesn't get automatic root access and the ability to poke into the kernel just because you want it.
If an app wants root access, it'll pop up a password prompt. If you want it, it can poke anything.
I wouldn't put anything in a lockbox. Such media will be tested very rarely, and when they do fail, it's likely you won't know until it's too late.
I'd rather use a hard drive, hooked up (NAS or mini-pc, maybe) to a network and capable of rsync. You could place it somewhere in your home, or, if available, another secure location with Internet access. Run daily or nightly automated backups.