One more stupid question—how is this different from a “man in the middle” attack? (Term from cryptography where you cannot trust your communications, because of a malicious agent between you and your recipient who’s changing your messages) The current recommended solution for those is encrypting your communication before you send it; I don’t know that there are any extant solutions for noticing you’ve got an MITM situation after the fact.
One more stupid question—how is this different from a “man in the middle” attack? (Term from cryptography where you cannot trust your communications, because of a malicious agent between you and your recipient who’s changing your messages)
The current recommended solution for those is encrypting your communication before you send it; I don’t know that there are any extant solutions for noticing you’ve got an MITM situation after the fact.