Abstract: End user clients and experts are provided with a method for connecting with one another in a secure and anonymous fashion. Previously supplied protocols permit users of the method to define criteria for allowing a connection based both upon supplied key words and also upon specified preferred or required communication modalities. The protocols interact with a dispatch servicer running on a first server but the parties connect through address and port information defined on a second server operating as a tunneling server providing secure connections for video, text based chat, VoIP, remote access or other transfers of information.