In principle, Mynigma’s automatic encryption mechanism is vulnerable to the well-known problem of a man-in-the-middle (MITM) attack during the initial key exchange. For most users, passive data collection is a more prominent issue, but if such an attack is a worry, Mynigma will offer user-friendly means of detecting it - comparing a QR code either in person or via text message, for example. In addition, we ensure that key introductions must be signed with both the old and the new key, preventing a MITM from 'escaping'. Elevating the risk of discovery in this way raises the cost of a potential attack to a point where it may not be worthwhile in the first place.