Command Line Heroes cover image

Menace in the Middle

Command Line Heroes

CHAPTER

Introduction

The crossed wires problem has been around ever since we started using tech to send each other messages. People have even used submarines to dive down and tap into the fibre optic cables that span our oceans. Every new form of communication technology creates a new opportunity to intercept r notes. An insecure connection can mean a payment you just made get scooped up in transit, or corporate secrets are stolen. Some of our most valuable assets are shuttled around the world via digital technology - and bad actors try to catch them where they can. These are machine n the middle attacks. You might have heard them called man in the middle attacks; monster in the middle,. meddler in the middle: something is messing

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner