Man In The Middle
I believe the original assertion was correct. They accomplish this in precisely the same manner that a 'Man In The Middle' attack is implemented. They do this to realize efficiencies, so my expectation is that in time with faster processors and increased bandwidth, the need will disappear completely. You'd hope that in the interim, people would be permitted to choose what's most important to them,... security or efficiency.
Keep Up with TechRepublic