answered 2021-02-03 10:36:40 +0000
You can't.
Decrypting traffic from 3rd party devices without the correct key set from 1 of the 2 endpoints is not possible without quantum computing and a bruteforce attack.
I think you have an incorrect expectation here.