Our communications travel throughout a complex network of networks in order to get from place A to point B. During that journey they are prone to interception by unintended recipients who understand how to control the networks. In the same way, we’ve arrive at rely on portable devices which can be far more than just phones—they have our images,