Our communications travel throughout a posh community of networks in an effort to get from point A to place B. Through that journey they are liable to interception by unintended recipients who know how to govern the networks. Likewise, we’ve come to depend upon transportable products which can be extra than just phones—they have our pics, docum