Replies: 2 comments 1 reply
-
So, using a proxy? |
Beta Was this translation helpful? Give feedback.
1 reply
-
AFAIK that's how a lot of research has been done so far on the protocol, using Iridium I think. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
establish fake server that client connect to ,but the fake server connect to the real server, is it viable analysis way by man in the middle attack
Beta Was this translation helpful? Give feedback.
All reactions