>>9
That's also a reasonable opinion. Even when administering a large secret organization, generally you would want to distribute secret information hierarchically and on a need to know basis. That being said perhaps to avoid targeted or automated manipulation it could be useful to encrypt conversations with your family and friends. It may then be that my last sentence in >>8 is false. Or perhaps it would be better to control information input (assumed primary means of manipulation) than to attempt to restrict reading of output. I don't know.