With current technology, this is practically impossible if appropriately long and secure passwords and encryption technologies are used. The state of the art is symmetric AES-256 encryption. Only possible due to weaknesses in the implementation or compromised end devices.