Then why did you imply that someone could intercept the data flow and descript it?
All electronic communication is subject to interception.
It’s routed from server to server and all points in between.