. . . "After receipt, the message can be decrypted such as by entering an encryption password on an input (e.g. a keyboard) of the receiving device, whereupon the message is conveyed to the recipient in text, audio or other format." . .