How Encryption Works - and How It Can Be Bypassed