There are other ways of getting at the conversation than brute-force decryption of the hacking.