Figure 8.8 In a person-in-the-middle attack, the attacker
can grab or alter traffic between Alice and Bob