Right. Imagine the enemy, posing as leaders, giving false text orders in battle.
...something that even in plain text we have some procedures to prevent. (”Authentication Tables.” Stone age, but workable.)
The larger problem is intel gained from intercept and analysis.
“AC” is having trouble with their water plant.
Revealed who “AC” was. (Pacific WW2)