It is unlikely (with the exception of certain "agencies" that maintain sniffing equipment withing the Internet's routing infrastructure).I have another question related to this:
Suppose I log into a service like Twitter. My info goes from my iPhone to my router to my ISP, and then is routed somehow to Twitter. Can anyone along this chain/path after my router use this exploit?