Attackers can easily entry shopper information and facts by means of unsecured connections. Such a breach could discourage customers from long run transactions Along with the company due to misplaced belief.Now here is the capture, suppose Bob wishes to transmit a private info that only Alice must obtain, he can't accomplish that With this protocol