Our communications travel across a complex community of networks as a way to get from point A to issue B. During that journey They're vulnerable to interception by unintended recipients who know how to control the networks. In the same way, we’ve come to rely on transportable devices that are additional than just phones—they include our photogr