Practical public-key cryptography with GnuPG, part 2 of 2

It doesn’t matter how your email or file will get from A to B. It may go directly, it may go through C, it may go through X and Y and Z — heck, it may also go through all the letters of the alphabet. No matter how simple or convoluted the path is, should you choose to strongly encrypt your emails or your files with GnuPG, then nobody but the intended recipients will have access to their contents.