How Encryption Works - And How It Can Be Bypassed