Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It makes a MITM attack possible, that doesn't require access to the target or the website it's contacting.

I'd still guess zero times though.



A MITM attack requires some kind of access to the target or the server. You can't just intercept connections of whoever you want on the Internet.


You need to be a hop on the route the data takes yes, but access to the source or destination machine is not a necessity.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: