Our communications vacation throughout a fancy network of networks as a way to get from level A to stage B. Throughout that journey they are liable to interception by unintended recipients who understand how to manipulate the networks. In the same way, we’ve come to rely on transportable gadgets that are additional than simply phones—they have