nsa edward snowden 2014 3

nsa edward snowden 2014 3

By exploiting HTTP it gives NSA the ability to actively monitor or intercept data by using a “Man in the Middle” approach.