Circumventing encrypted messages

I’d guess that you’re only as secure as the weakest device in the chain - if somebody has hacked your (or your recipient’s) device they only need access to your mic, keyboard and display and they essentially have access to all conversations :upside_down_face:

1 Like