Well, the best encryption today is so strong that not even the US NSA can crack it. Of course, that just means they turn to hacking techniques; i.e., finding vulnerabilities in OSes and ways to exploit them, which naturally cause havoc when they get leaked, as with the WannaCry debacle.
I believe the idea of universal HTTPS was a good one: if everyone uses it, then its use won't be looked on with suspicion, so we paranoid types won't be targeted by the likes of the NSA or MI5/6 as "potential terrorists" just for trying to protect our privacy. That's also why the UK took the extreme (IMO) step of banning end-to-end IM encryption: if they could crack the encryption, they wouldn't have bothered; but if, instead, encryption is outlawed, they can just "assume" anyone using it is up to no good and investigate them. (It won't work though: the "real" terrorists will just use steganography to conceal encrypted messages in innocuous-seeming images, audio files, etc.; the ones that'll get busted are folks just trying to conceal an affair or something.)
What does annoy me, though, is the way Web sites keep disabling older, less secure protocols and ciphers. Sure, the newest protocols and ciphers should always be the first choices, but there's no good reason to lock folks out of your Web site just because they're still on Android 4.0 or XP or whatever. But at least we have @roytam1's browsers with the latest NSS versions to handle those sites that require the latest security.