by fafhrd09
Its so HOT of the 3 Chapters - really is arousing !! I cannot wait until the next chapter or so . . . thank you !
In the story you bring up Trillian for encrypted instant messaging, I hope you don't use this in real life for anything important, for a brief discussion of why see http://en.wikipedia.org/wiki/Trillian_%28software%29#SecureIM . In short it is vulnerable to MITM attacks, AND it is easily decrypted. All it really solves is dragnet (NSA like) surveillance as you can't passively scan for keywords without spending computing time to decrypt it.