Our communications vacation across a fancy network of networks so as to get from place A to issue B. Throughout that journey they are prone to interception by unintended recipients who know how to govern the networks. Equally, we’ve come to trust in transportable products which might be far more than just phones—they include our photos, documen