it's much easier to do a MITM attack by implementing a TCP proxy. That
means, you're simulating Alice for Bob, and you're simulating Bob for
Alice, so that you have two TCP connections.
" *** ography is an abstract phenomenon. It cannot exist without a medium
to propagate it, and it has very little (if anything at all) to do with sex."