Our communications travel across a fancy network of networks in order to get from place A to stage B. All over that journey They can be prone to interception by unintended recipients who understand how to govern the networks. Similarly, we’ve come to trust in portable units which have been much more than simply telephones—they comprise our pict