If you use any of THEIR equipment, they can intercept. You have to bypass their last mile, distribution, transport, and core networks in order to get around them. So basically, we'd have to create an entirely separate network. I think the best thing would be to try to encrypt the data, that's...