Our communications travel across a posh network of networks to be able to get from point A to place B. During that journey they are at risk of interception by unintended recipients who know how to govern the networks. Likewise, we’ve arrive at depend on transportable devices that happen to be much more than simply telephones—they include our pi