@ferret Idk, the standard could intentionally configure your communications in a way that is more easily monitored via some other pathway the attacker controls. There's also the issue of people relying on reference implementations that may have some less subtle designed flaw.