With minimal cable access, commercially available tools and AI, attackers can technically listen in to your conversations via ...