I am unfamiliar with The Onion Router (TOR), but keep in mind that just because you encript the message successfully does not mean that the transmission is not detected. The mear fact that it is encripted is a flag that it should be monitored and examined.
If it is a transmission of pics or video, I am not sure how you would handle that. I am sure there is a way.
If it is being handled by RF networks, spread spectrum offers a lot of security. Whichever method of frequency hopping you choose. I doubt the average computer user can apply that, but governments do. Short burst on frequency hopping trasmitters and receivers are a good step to RF security. Problem with RF is bandwidth, fiber gives a lot higher data rate and for that reason is almost universally used where available.
I had no knowledge of the Tor router technology prior to reading this article. Interesting to say the least.
Well, I have an anonymous Twitter Server running at home that’s passing thousands of messages an hour out of Iran, a FreeGate Server and I donate bandwidth to TOR. My high speed internet connection is 50mb down, 22mb up. Roughly half my bandwidth is taken up by Twitter and Tor at the moment.
By the way, my Twitter server has been up more than a week now. TOR I’ve donated half my bandwidth to encrypted, secure, network browsing for more than a year now. EGate went up Thursday evening, haven’t seen any traffic across it yet.