In the cyberworld, the game of keep-away gets a new twist; the two players have no idea the man in the middle (MITM) exists. It works like this:
- Computer A initiates conversation with Computer B
- Computer C intercepts that attempt and then relays the request to Computer B
- Computer B responds, Computer C intercepts it, and returns that response to Computer A.