An overview of Man in the Middle Hardware Attacks Imagine this scenario. You’re texting your friend to arrange a time and place to meet. She says 2pm at your local coffee shop, but when you get there, she isn’t there. Maybe she is that friend who is always late, so you wait, but still nothing….