Our communications journey throughout a fancy community of networks in order to get from stage A to stage B. All through that journey they are prone to interception by unintended recipients who understand how to control the networks. In the same way, we’ve come to depend upon transportable devices which have been much more than simply phones—th