Nearly every digital system in use today is protected by systems that are based on standardized cryptographic algorithms (e.g., RSA, ECC, AES) that “scramble” the data so unless you have the decryption keys, it can’t be read. This is true of encrypted data at rest in a database, as well as encrypted data being moved in a network operation. It is also used extensively in user and device authentication. Nearly every network, whether wired or wireless, has some form of cryptography at its core (e.g., IPsec, SSL, WPA). Further, cryptography is at the heart of financial systems like electronic payments and credit card authorizations, is critical to digital signatures and crypto finance systems, is used to secure health records, government and military systems, and is even used in email and social media applications. Nearly every app or electronic product in use has crypto in some form as a key component.