"For example, a user can determine whether messages sent to or from the agent are to be secure and free from unauthorized manipulation or interrogation." . . . . .