IP has that capability built in, as does TCP, though they're not used for security, but reliability. Adding source routing to the IP might be able to make this work...
Mark
“IP has that capability built in, as does TCP, though they’re not used for security, but reliability. Adding source routing to the IP might be able to make this work...”
I’m thinking about doing it from client-to-client, with the pieces of the messages going to a small subset of a large number of random servers, at different times. Naturally, there would be decoys. And, encryption. That would be like looking for a needle in a landfill full of needles, and each needle has a part of an encrypted message engraved on it that can only be decrypted when properly assembled.