'man-in-the-middle (MITM) attack," a fairly well-known exploit used by elite hackers.'http://www.motherjones.com/politics/2013/09/flying-pig-nsa-impersonates-google …
-
-
Replying to @veorq
@veorq MitM attacks are mysterious and complicated so I made a diagram to clarify how they work: http://i.imgur.com/ZOr6qTV.png1 reply 17 retweets 5 likes -
Replying to @bascule
@bascule@veorq@kennyog My poor diagram from an article 2 years ago needs updating. http://blog.agilebits.com/2011/09/06/who-do-you-trust-to-tell-you-who-to-trust/ …pic.twitter.com/w75kHk84mT
1 reply 0 retweets 0 likes
Replying to @jpgoldberg
@jpgoldberg @veorq @kennyog everything needs more Mr. Bean ;)
10:36 AM - 15 Sep 2013
0 replies
0 retweets
0 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.