The utter panic of listening to a new client that works with abused women boast about their encryption, but it turns out they are just using a basic substitution cipher via some relative's first python script doing the substitution with the offset readable in cleartext.
I should be taking bets on how quickly I find the first external threat with active access in this network when I start going through things...