>>512587775
ISP level controls, and phone lines with built in backdoors at the hardware level are going to be continued problems for any system moving forward.
MAD is one potential concept that, if properly implemented, may be able to bypass such controls.
Mesh networks can use connections that ISP's may be unable to police, but CPU backdoors and locked down architecture remain problems in that domain for the future, and will likely cause more problems as time goes forward.
Even newer iterations of windows or anticheat for things like battlefield six are requiring secure mode enabled, so no unsigned programs can be effectively used, if at all. The concept of locking down capability rather than actual direct connection is a growing trend, and is being increasingly incorporated at the hardware level.
An easy way forward isn't on the cards for any kind of open information sharing.
If new methods are not palatable to the average user, mass adoption remains difficult.
If new methods do not possess the ability to actively repel attempts to breach or damage the new network, it will fall rapidly.
>>512588546
>t. uses kazaa to hack mainframes