Unencrypted traffic can be intercepted and read by attackers who perform monster-in-the-middle-attacks.