Our communications journey across a posh community of networks to be able to get from position A to stage B. All over that journey they are prone to interception by unintended recipients who understand how to manipulate the networks. Similarly, we’ve come to trust in transportable devices that happen to be much more than just telephones—they in