Easy for you.
Actually, easy for anyone. Cracking the prime gives a look-up table that lets you look up the key the parties are using from the data in the key agreement session, and then using whatever private-key encryption program they are using lets you read the communication the same way as the recipient.
The enemy just needs to find traitors and there are plenty of democrats who are selling our secrets to whoever for a price.
All the secret stuff on Hillary Clintons computer and the State dept computers were hacked into and I do not think it was an accident.