I’d guess that you’re only as secure as the weakest device in the chain - if somebody has hacked your (or your recipient’s) device they only need access to your mic, keyboard and display and they essentially have access to all conversations
1 Like