b'Dr. Krypt3ia discusses how jihadis use encryption software and broader OPSEC methods. \\n\\nYou can read Krypt3ia\'s broader treatment of jihadi encryption here, here, and here.'