Not if your threat model is someone who already has access to the local network (which has no one managing it) snooping on traffic.