"An attacker could then eavesdrop all victims' communications, and even send forged requests for information."
Eli Biham

January 1, 1970