Comment by Spivak
But given the attack is just logging the cleartext at the ends how are you going to detect that the servers are malicious?
But given the attack is just logging the cleartext at the ends how are you going to detect that the servers are malicious?