• BaumGeist@lemmy.ml
    link
    fedilink
    arrow-up
    2
    ·
    10 months ago

    Outside of controlling and rewriting the protocol: steal the keys used to generate the route or take over control of the server that hosts it