<!DOCTYPE html>
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
</head>
<body>
<div class="moz-cite-prefix">On 4/21/25 6:41 PM, Ron Garret wrote:<br>
</div>
<blockquote type="cite"
cite="mid:DA3CDC2A-F29D-4675-97A1-7D3A0D727653@flownet.com">
<pre class="moz-quote-pre" wrap="">But that's because the defense is in place. It's plausible that the reason we're not seeing MITM attacks is because the defense is effective.</pre>
</blockquote>
<p>Also we <i>have</i> seen a version of this.</p>
<p>Before e-mail logins were commonly encrypted there was a big
problem of people using public wifi and being sniffed. (This is
part of how the VPN by Fear market still runs today.) We have also
seen crooked wifi that isn't just passive sniffing but lying DNS,
etc.<br>
</p>
<p>Yes, I understand some attacks are different from "MitM". The
point is there will be bad guys attacking at the wifi if attacking
at the wifi be profitable. And if MitM is a good way to attack
wifi it will happen. And pretty much all user network access is
wireless these days, if not cell data, wifi.</p>
<p>-kb<br>
</p>
</body>
</html>