The only "it's possible" in this article can be if client or server are infected with destructive computer software which can see the information right before it really is wrapped in https. However, if a person is infected with this type of computer software, they can have entry to the information, regardless of the you use to transport it.I acquir