The problem with current web-security lies in different levels, both in the application-layer as well as the actual networking – data transferred in the background.
As it is now, it requires an HTTPs-connection to have an encrypted data-transfer, and while it’s widely available for everyone to use – not everyone chooses to adopt it. Each can have their reasons; heavier server load due to encrypting/decrypting, requires extra set-up, not every proxy-server supports HTTPs traffic and thus blocks the site, …
A solution to this would be to start securing your data-transfers on the TCP level, by adding a layer of “encryption” to it. That’s what Google’s Obfuscated TCP (obstcp) is all about. A transport layer protocol that adds opportunistic encryption.
This method can help with easy sniffing of network traffic on public wifi’s, or your personal network. Google provided an easy-to-follow introduction video, that explains in short how it works and what it can do.
While the idea sounds great in theory, it requires yet another implementation of current software. And history’s proven that’s not an easy thing to accomplish. Then again, Google does have quite an influence.
You can read more about it at the http://code.google.com/p/obstcp/ pages.