The Man in the Middlebox: Violations of End-to-End Encryption