Comment by cwillu

1 day ago

The ends still have the decryption keys, so the result is the same as with a physical letter: you have to acquire the physical object holding the key material.

The result is not the same as a physical letter, as you can intercept those covertly (which is resource constrained)