There's a very specific reason I included B and C in my listed cases. I agree in many or most cases it could be said that it's unlikely certain encryption methods would be bypassed, but to me that only gives you a fairly good prospect of being secure, not an absolute certainty. That may or may not affect your original argument, I'm not sure.