Our communications journey across a complex network of networks as a way to get from issue A to point B. In the course of that journey They're vulnerable to interception by unintended recipients who understand how to control the networks. Likewise, we’ve come to count on moveable products which have been far more than just telephones—they compr