Thanks to the 2013 mass surveillance revelations, we can assume that government spies intercept all electronic communications. In addition, we have good reasons to suspect that all commercial encryption systems are compromised.
So this is the key question: How do the bad guys continue to operate?
The Ultimate in Privacy Protection
The answer is obvious. Terrorists and criminals use non-commercial encryption techniques or they rely on private codes. Their messages are confidential because Big Brother has no back door access. Bad guys can truly keep their secrets — especially if their codes or cipher keys are changed frequently and leaks are avoided. (A totally secure cipher can involve a one-time pad or similar technique. Check this out. It provides an example of a cipher technique that can’t be cracked.)
Click this link to learn how you can avoid your Big nosy Brother.