3min chapter

Command Line Heroes cover image

Menace in the Middle

Command Line Heroes

CHAPTER

Introduction

The crossed wires problem has been around ever since we started using tech to send each other messages. People have even used submarines to dive down and tap into the fibre optic cables that span our oceans. Every new form of communication technology creates a new opportunity to intercept r notes. An insecure connection can mean a payment you just made get scooped up in transit, or corporate secrets are stolen. Some of our most valuable assets are shuttled around the world via digital technology - and bad actors try to catch them where they can. These are machine n the middle attacks. You might have heard them called man in the middle attacks; monster in the middle,. meddler in the middle: something is messing

00:00

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode