> If authorities wanted to intercept the communications of a person using Silent Circle, it is likely they’d have to resort to deploying Trojan-style tools—infecting targeted devices with spyware to covertly record communications before they become encrypted.