A government can certainly try to force us to provide information, as can anyone else via legal proceedings. They do so all the time. Some of the subpoenas are quashed immediately, due to errors or incompetence. Those that survive the initial scrutiny from our attorneys have not been a problem to date.
SecureNym, from day one ten years ago, chose a much different security model than Hush. The whole premise of our security is that we cannot be forced to reveal what we don't know. Ignorance is a simple, and very reliable, defense that has served both our users and us quite well.
We do NOT have any way of knowing who has what account. When a user receives an account creation key, and enters it into our system, the key is securely deleted BEFORE the user is directed to the account creation page. Thus, the connection between an account key and a specific account never exists. This is why we admonish users to be sure to complete the process immediately, because otherwise we have no way of recovering the key.
This means that it might be possible for someone to discover the user's payment to SecureNym, via financial records at a credit card company, but there is no way to prove that the account key was even used, much less what account it might have been used to create. A payment is circumstantial evidence, at very best.
Next, we have no way of recovering a password. SecureNym uses a Catch-22 to make sure that we can't do so, and that no one else could either. All passwords are encrypted and stored in our databases. The decryption key is a cryptographic 'hash' of the account name and the...... password. In short, you must know the password to decrypt the password.
Your messages are all encrypted with that same cryptographic hash, on the fly, as they arrive at our servers. The same rule applies; the messages can be decrypted ONLY with the user's account name and password.