@GNious that's a great idea! There are many techniques that organizations under Five Eyes and Nine Eyes jurisdictions, e.g. VPNs, use to make it nearly impossible to comply with any requests for data, e.g. IP logs, etc. If you're not already familiar, you might want to ask @th3j35t3r about how he keeps us secure and inscrutable.
Unfortunately they might just ask Google and Apple to remove it from their stores. If they don't, the states will probably have Trump's DOJ on their side.
@GNious @th3j35t3r obviously the number one priority is doing as much as possible to prevent anyone, especially govt entities, from obtaining info that results in the identification of the user. I don't know which technologies currently provide the most effective protection against info leakage, in the broadest sense, e.g., analyzing network patterns via ML to identify servers, etc. I guess the starting point is to see what threat models are addressed by existing solutions and improve them.