Methods, systems, and protocols are described for securing data in transit
over networks. A communication session is initiated between a client and
a server. One or more communication channels can be set up between the
client and the server. Each established communication channel may have
zero or more intermediary nodes that are selected by the client or by the
server to process information exchanged between the client and the server
via the communication channels.