To implement and secure such a structure which would dwarf the application itself.It would take a scheme similar to the Chinese Bamboo curtain and even that despite its size, has holes. Even the tracing of I.P. addresses does not always get you to the same person/household and what system is to be put in place to stop spurious websites collecting great draft of user data for illicit use. The internet has only ever been semi secure itself so implementing any identification system over it is fraught with problems.