Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If the data is changed without the permission of either end party, then it is an attack. There was no 'harm' done to the parties involved, but the 'attack' here is not aimed at the parties, it's aimed at the integrity of the connection. The integrity was completely destroyed, so I think 'attack' is an appropriate term.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: