If you're connected to the world wide web and you send/receive data, there's a strong chance that either:
a) Either sending/receiving machine is broken into
b) Someone or something is intercepting your message
c) The service you are using is broken into
There's just too many holes to plug and too many people with expertise in these domains orders of magnitude above ours that they can use to either be malicious, or help our cause.
Your computer/device needs to be secure. Your other parties devices need to be secure. Your connection needs to be secure. Your third parties service needs to be secure. The internet the third party uses needs to be secure. Their data centre needs to be secure. Then their ISP needs to be secure.
a) Either sending/receiving machine is broken into
b) Someone or something is intercepting your message
c) The service you are using is broken into
There's just too many holes to plug and too many people with expertise in these domains orders of magnitude above ours that they can use to either be malicious, or help our cause.
Your computer/device needs to be secure. Your other parties devices need to be secure. Your connection needs to be secure. Your third parties service needs to be secure. The internet the third party uses needs to be secure. Their data centre needs to be secure. Then their ISP needs to be secure.
All data is online.