Us hackers need to make a new "web" a web where censorship is not possible and everything is encrypted, a "web" with no single points of failure, a "web" where domains cant snatched or censored, a "web" like the web used to be :(
It's already there, developed by the US military no less. It's called Tor. If the installing and usability was improved it might catch on for normal people concerned about their privacy.
For what it's worth, it's actually as easy on Linux and Mac as well. There is a prevailing myth that Tor has this enormous learning curve and is only for neckbearded hacker masterminds, and it could not be any more wrong. This is by design - The Tor Project wants anonymity to be for everyone who desires it.
Running a relay to help could be a good start. It's pretty simple[0][1]. The risks associated with being a Tor exit node do not apply to all relay types and the network can be helped greatly by running a standard relay too (standard relays only pass encrypted traffic from A to B).
If I were to run an exit node or a relay node, how would I mitigate the rare-but-potentially-life-destroying risk that my machine is identified as trafficking in illegal bits, due to relaying/exiting traffic of that nature from the anonymized network? I would be happy to donate bandwidth, but that risk is something which I don't feel is acceptable.
A normal, non-exit relay node will not be identified as "trafficking in illegal bits" by any sane police force. A normal relay will trade from A to B in only encrypted traffic and will not touch websites on the behalf of users, only other relays.
It is rare that an exit node is raided but there has been no known occurrence in which a normal relay was raided.. nor would it make any sense for there to be. Many people run non-exit relays as they are uncomfortable with the risk of exiting for the Tor network, perhaps you should be one of them.
That isn't a risk for relay nodes, because you would be relaying encrypted traffic. It would just be noise.
For exit nodes, the issue of legal liability for routing other's traffic is less clear. You'd basically run the same risks as providing an open wireless network: https://openwireless.org/myths-legal
I'll throw in another anonymity network (I2P). Its design is similar to Tor, created in 2003 and is mostly interesting due to some of its properties (tunnel based/garlic routing, everybody-is-a-router, etc).