1 | initial version |
You can't.
Decrypting traffic from 3rd party devices without the correct key set from 1 of the 2 endpoints is not possible without quantum computing and a bruteforce attack.
I think you have an incorrect expectation here.