Cryptography and Identity
Given the PKI problems, encrypted traffic is effectively unauthenticated.
This does prevent broad-spectrum eavesdropping.
But active attacks can go around the cryptography to penetrate systems -- and such attacks are taking place.