1. {n. d.}. How The NSA Pulls Off Man-In-The-Middle Attacks: With Help From The Telcos. ({n. d.}). https://goo.gl/Kg4ysn. {n. d.}. How The NSA Pulls Off Man-In-The-Middle Attacks: With Help From The Telcos. ({n. d.}). https://goo.gl/Kg4ysn.
2. {n. d.}. ChatSecure Encrypted Messenger. ({n. d.}). https://chatsecure.org/. {n. d.}. ChatSecure Encrypted Messenger. ({n. d.}). https://chatsecure.org/.
3. {n. d.}. Diffie-Hellman key exchange. https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange. ({n. d.}). {n. d.}. Diffie-Hellman key exchange. https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange. ({n. d.}).
4. {n. d.}. Double Ratchet Algorithm. https://github.com/trevp/double_ratchet/wiki. ({n. d.}). {n. d.}. Double Ratchet Algorithm. https://github.com/trevp/double_ratchet/wiki. ({n. d.}).
5. {n. d.}. Facebook Messenger. https://www.messenger.com/. ({n. d.}). {n. d.}. Facebook Messenger. https://www.messenger.com/. ({n. d.}).