• BaumGeist@lemmy.ml
    link
    fedilink
    arrow-up
    1
    ·
    9 months ago

    Outside of controlling and rewriting the protocol: steal the keys used to generate the route or take over control of the server that hosts it