Regardless of how secure a communication line is and how unbreakable a cryptographic algorithm seems to be, the weak links are often the endpoints - the sender (before encryption) and the recipient (after decryption) - unless they are code talkers using a language more obscure than Navajo.