Our communications travel across a complex community of networks so that you can get from position A to level B. Throughout that journey they are prone to interception by unintended recipients who know how to manipulate the networks. Likewise, we’ve arrive at trust in transportable units which can be much more than simply phones—they contain ou