This invention concept pertains to a system that ensures that the proper filtering is applied to different users of an IDEAINT system, to ensure that filtering is applied to users based on their preferences and/or security settings in the system, so that content can be filtered based on application streams or based on security that is applied to the user or to applications that are used within the IDEAINT streams. This will allow, for an example, the filtering of applications that are used for each IDEAINT user, even within a system jurisdiction, to ensure that undesired effects of unnecessary or unruly applications are not felt or realized by users, such as damaging programs or viruses. Additionally, the server system could have roaming profiles, and could also have artificial intelligence, that automatically configures security based on security template profiles, that can easily be customized based on other profiles, to ensure that security preferences are not lost or even copied from one user to another to expose security vulnerabilities that exist on one user to another, by ensuring that secrecy is maintained through compartmentalization of users, while still allowing desirable communications and applications, even to new users. Additionally, the server could ensure that third parties are unable to control users undesirably, such as ensuring that server administrators cannot compromise the security of users based on their security credentials, however that security administrators can still ensure the security of the server’s users. The server could be multi-tiered to allow multiple jurisdictional levels of security, to ensure that different jurisdictions can apply security models, however also that higher security jurisdictions cannot compromise the overall security of lower or different localities with political tendencies or political control mechanisms. Additionally, the server would allow overall security to ensure that all users do not need to specify their security models or security preferences, per se, to have proper security on an application layer for needed services to work, and for undesired mechanism and applications to not be able to control or access a user, undesirably based on the user or the security jurisdiction or even a properly authorized security administrator, or based on security settings from a properly authorized security administrator.