Figure 1 Possible interception points

Figure 1 Possible interception points

Figure 1: Possible interception points on the path between the potential victim’s machine and the Adobe servers.