question for the cyberbros:
>And then there's the challenge of encrypted traffic. While some firewalls do claim to perform deep packet inspection on HTTPS traffic, the process of decrypting data and inspecting it inline with traffic flows is a processor-intensive activity that overwhelms many hardware-based security devices. In response, administrators often choose to turn off the capability within their firewalls.
how does the government do it?
do they just waste computing power trying to decrypt packets?