The hopeful side of me wants SCOTUS to hear this.
The skeptical side of me wants SCOTUS far away from setting precedent based upon the potentially criminal behavior of someone that attracted police ire in the first place. More often than not, they side with the Executive Branch.
I was actually just 15 minutes ago, thinking about opening a thread pertaining to Fiber Optic splitting in context of room 641a, and the value of public/private encryption where the server sends a key over wire/light in the first place. The "sniffer" in 641a intercepts the public key that you get, rendering public/private encryption worthless.
Thus, any "encrypted" files stored on an internet resource based upon a public/private encryption exchange between the file server and your computer, will result in interception of the key as well as the packet data.
However, VPN or other authentication schemes using private/private encryption (such as random number key fobs with passcode tokens) are still immune to intermediary snooping, as far as I can figure. As long as the vendor of the private/private system hasn't allowed for a software back-door to the algorithm.
Or, anything encrypted locally to your computer and THEN sent over the wire (clear or otherwise) using a private key, will still be secure (in theory).
I weep for the 5th.
I'm sure that once the Statists get their pet SCOTUS ruling, if darker days do come in regards to this issue, PGP will be grounds for a no-knock... accessing the digital data while unencrypted because the user is actively using it during the warrant execution. After all, you NEED a SWAT team to get those dangerous embezzlers and kiddie pr0n traders (as repulsive as that is, it don't need a no-knock).