A rhetorical question: Is it better or worse to have your own service provider hacking you
Or some other "malicious node"? That term "malicious node" did not seem to be well explained in this article.
It's also not clear if the "lazy" LTEInspector was so named because it is passive. It sounds like it wouldn't take much to make something like that pretty hyper.
So, much like most of our other protocols back to smoke signals, the developers couldn't have foreseen a future where every bit transmitted was suspect. And Alice and Bob may not even be who they say they are.