nudelbiotop

joined 1 year ago
[–] [email protected] 3 points 1 year ago* (last edited 1 year ago)

Anyone who has access to any involved network infrastructure can trace the cleartext communication and extract the credentials.