Lines Matching full:attacker
448 An attacker cannot obtain key material from the agent,467 An attacker may then be able to perform activities such as keystroke monitoring