that, even if the MITM cannot decrypt the traffic sent between the two
endpoints, when the MITM can correctly predict when an ephemeral key exchange
message is sent in a TCP connection between two nodes, allows the MITM to
that, even if the MITM cannot decrypt the traffic sent between the two
endpoints, when the MITM can correctly predict when an ephemeral key exchange
message is sent in a TCP connection between two nodes, allows the MITM to