Is this really that different from the practices of many corporations that MitM Internet traffic as a security measure? It's on a far larger scale, of course. But it could use the same approach, right?