Currently, between the wild variety of freely available tools at the hacker's disposition and the large number of dedicated security software, it is unpardonable to keep using unencrypted means of communication. In many instances, the balance is tilting towards increased security. It used to be that you had to choose between ease of use and security, but that is not the case anymore. Most of the tools we have seen in this chapter, when run in their basic use case scenario, are as flexible and user friendly as their insecure counterparts. Be safe, use them!
—Julien Sobrier and Eric Moret