Our communications travel throughout a complex community of networks as a way to get from position A to place B. In the course of that journey they are prone to interception by unintended recipients who know how to govern the networks. In the same way, we’ve arrive at trust in transportable gadgets which can be a lot more than just telephones—t