Content protected from screenshots
Question

What is a man-in-the-middle (MitM) attack?