Our communications travel across a complex community of networks so as to get from point A to stage B. In the course of that journey they are vulnerable to interception by unintended recipients who know the way to govern the networks. Similarly, we’ve come to rely upon transportable equipment which have been extra than just telephones—they incl