In the network formerly known as freenet, forgetting the current name, traffic to and from the node, and the data at rest is all encrypted, only referenced by keys so nobody has a real influence on what they store or transmit. Plus, they only know the peer that made a request, not a source or a destination, so just ‘pass this key back to me if you have it, otherwise ask the next person’, so routing is just as opaque.
In cases like that there’s not much to be done, as it well should be because as soon as control can be performed it’ll be demanded or liability placed on those who don’t comply.
In the network formerly known as freenet, forgetting the current name, traffic to and from the node, and the data at rest is all encrypted, only referenced by keys so nobody has a real influence on what they store or transmit. Plus, they only know the peer that made a request, not a source or a destination, so just ‘pass this key back to me if you have it, otherwise ask the next person’, so routing is just as opaque.
In cases like that there’s not much to be done, as it well should be because as soon as control can be performed it’ll be demanded or liability placed on those who don’t comply.