Skip to main content

Can a peer intercept traffic?