Examining the Challenges and Possibilities of Encrypted Mempools