Our communications travel across a fancy network of networks so that you can get from level A to place B. In the course of that journey They may be susceptible to interception by unintended recipients who understand how to control the networks. Likewise, we’ve come to trust in moveable devices that happen to be more than simply phones—they inco