the encryption keys, why can't the government just sneak on them? disclaimer: I’m just asking to get understanding of the theory behind network traffic encryption, I know this doesn’t happen irl most likely....