400
By intercepting the endpoints in an online information exchange (i.e. the connection from your smartphone to a website), this attack can obtain information from the end user and the entity he or she is communicating with.
What is the Man in the Middle attack?