Nevermind hackers. Look up “corporation in the middle” attacks, which is a prime example of subverting secure channels at scale.
If you don’t own the hardware, nothing you do on it is truly private. Ditto if someone else has admin access to your hardware (eg BYOD scenarios) . Inserting a root certificate into the OS is trivial in both cases.
Don is an addict. No matter how much money, women or success he gets, it will never be enough. He’ll chase that next high to the end of the earth.