![](https://feddit.de/pictrs/image/f6618ae8-cc7d-42d9-809d-193ffb3d1375.jpeg)
![](https://lemmy.world/pictrs/image/44bf11eb-4336-40eb-9778-e96fc5223124.png)
1·
1 year agoAnyone who has access to any involved network infrastructure can trace the cleartext communication and extract the credentials.
Anyone who has access to any involved network infrastructure can trace the cleartext communication and extract the credentials.
I am looking into something similar. Sharing some thoughts here.