So if they actually implemented E2E encryption like they said (last time they were called out on lying about it), how exactly would they even collect this information?
You'd need to MITM the calls for it to even be possible, which raises other issues...