Cable-level interception: captures encrypted ciphertext — useless without keys - Legal orders to companies: companies cannot produce what they don't have (no keys) - Limitation: metadata remains accessible; device-level attacks (Pegasus) can bypass