1 this kind of system known as Adversary-in-the-Middle (AitM). This describes an attack where the risk actor intercepts messages concerning the sender and receiver, letting them steal delicate identification details. https://hamzawroe559283.thenerdsblog.com/35681512/online-id-verification-service-an-overview