> I am not sure what Kyle means by "encryption hides attacks".
Interfaces designed for humans are frequent targets for attack. Network
monitoring tools are incredibly helpful for identifying compromised
machines, bots, and humans trying to bust in. So yes, encryption does hide
attack activity just as it hides everything else. There are other
legitimate reasons to monitor traffic such as to debug problems.
Encryption is a powerful and useful tool. But I wouldn't want to exaggerate
its effectiveness in protecting privacy nor ignore costs or consequences of
implementation. My guess is the vast majority of people on this list have
been hosed at some point by a technical decision made upstream from their
workflow that was based on what "everyone" needed or didn't.