How would it drill through encryption? Using simple end to end public key cryptography (e.g. the https protocol) should make this impossible. It takes massive amounts of computing power to decrypt something encrypted with large enough prime numbers. And monitoring this traffic in real time, I don't think so.
|