It seems that the weakest link in encrypted communications is the risk that a network-connected encrypting/decrypting device may be compromised...
Separate names with a comma.