Monkeyboy1970 I like the questions. Definitely helps work through it. The software that powers it would be open-source to verify it is encrypting as required. The only part not open source would be the encryption keys. This is different from encoding where you could ‘decode’ the data to find identities. One way encryption on IDs would store a unique variable that meant nothing to anyone but the computer. Every purchase would total an algorithm for the activities that hashed ‘identity’ had been up to, and, if triggering a certain level, would send an email to a contact in that local jurisdiction of the majority of purchases for investigation into the identity and overall activities of the flagged person.
Coming from a law-enforcement background I know how impossible it is to investigate “WELL THEY SAID…” on social media or whatever. But, coupled with a flagged file that also says they’ve also purchased 4 guns, 1,000 rounds of ammunition and a bullet proof vest in the last 2 weeks, now I have probable cause and a judge would probably quickly sign off on deeper investigation and possibly even criminal charges where action has been taken towards fulfilling a threat.
There would be no information to control because it would be useless.