trackers are vulnerable to mitm attackes,, if I set-up a "free" tracker, then then, when the connection is supposed to happen I connect the client to my "evil webrtc device" instead of the actual device he wants to, and connect the "evil webrtc device" to the intended recipient, boom, mitm attack
How does one prevent an MITM attack/ensure the data is unread ?
- send spoof data (which could be large occasionally)
- encrypt data FROM THE START, symmetric encryption should be fine if both the target and the owner know the secret key