. "Although this has the advantage of security and transparency to application-level software, the approach is not well suited to the task of parsing traffic encrypted with technologies such as SSL or VPN (i.e., connection-layer encryption)." . . . .