1 this kind of system is termed Adversary-in-the-Middle (AitM). This describes an attack where the menace actor intercepts messages concerning the sender and recipient, allowing them steal sensitive identification https://jaydtsy793730.liberty-blog.com/30170964/the-2-minute-rule-for-online-id-verification-service