Any time you use a device to communicate information—an email, a text message, any data transfer—the information in that transmission crosses the open internet, where it could be intercepted. Such communications are also reliant on internet connectivity, ofte…