Chapter 3

Securing communications

How can encryption work to keep communications secure? And what kinds of online threats might I face?