Despite what you read on Hacker News no amount of encryption or software trickery is going to stop this.
We can speculate about whether the tech exists, but read their guide to securing your Red Hat box and decide for yourself how good they are at publishing defense against attacks they won't tell you about: https://www.nsa.gov/ia/_files/os/redhat/rhel5-guide-i731.pdf