Our communications travel across a fancy community of networks to be able to get from point A to place B. Throughout that journey They can be at risk of interception by unintended recipients who know the way to manipulate the networks. Equally, we’ve come to rely on portable devices which are much more than just phones—they have our photographs