a single such strategy is named Adversary-in-the-Middle (AitM). This describes an attack where by the risk actor intercepts messages in between the sender and receiver, allowing them steal sensitive identification info. https://aishapjmt046109.educationalimpactblog.com/52369005/considerations-to-know-about-identity-verification-service