• BaumGeist@lemmy.ml
    link
    fedilink
    arrow-up
    2
    ·
    2 年前

    Outside of controlling and rewriting the protocol: steal the keys used to generate the route or take over control of the server that hosts it