The ends still have the decryption keys, so the result is the same as with a physical letter: you have to acquire the physical object holding the key material.
The result is not the same as a physical letter, as you can intercept those covertly (which is resource constrained)
The result is not the same as a physical letter, as you can intercept those covertly (which is resource constrained)