Figure 8.8 In a person-in-the-middle attack, the attacker can grab or alter traffic between Alice and Bob