

Removed the ability to communicate cryptographically. Our only tool.
Not entirely. The old methods still work. I’m talking about old fashioned pen and paper. OTP ciphers and dead drops. Messages, hidden where only the intended recipient knows it’s there. The problem is, there’s no dead drops in cyberspace. There’s no place one can leave a hidden message that can’t be seen by others in cyberspace. And while quantum computing might break OTP, it’s too expensive to use for that purpose.
There’s a certain artistry to the old ways. Invisible inks, dead drops, One-Time-Pads, and the like. Cryptography existed long before computers. Those who would be our rulers have bent so much of their energies towards preventing our communicating in cyberspace that they’ve neglected those of us who studied the pre-Information Age methods. And we can still use them. A guy walks by a trash can, and throws away a seemingly innocuous food wrapper, and a couple hours later another guy goes and collects it, knowing that there is a message written on it in ink that can be revealed with the use of heat and lemon juice. If their intent is to return the USA to the “good ole days”, then let’s use the spy tricks from the “good ole days”.
For the landlocked, may I recommend the Dead Drop Protocol? Leave the message in a place that everyone knows about, but only the intended recipients knows a message is there to be read. Like the Message in a Bottle, it supports all encryption methods and is disconnected from the Internet.
There are a couple drawbacks, though. For one, unless you are watching the drop point, you have no way of knowing whether your message made it to the intended recipient or if it was intercepted. Vice versa, if you are the intended recipient of a dropped message, the only guarantee you have that the message is authentic is if the message uses a self-authenticating encryption method. Also, there is a potential that any drop point you use may be under surveillance, so make sure to not use the same drop point too often.