Is the rolling jam attack considered a MITM attack
As far as I understand, the rolling-jam attack involves eavesdropping, signal blocking and replaying.
Does that qualify it as an MITM attack?
Could one say that the attacker is controlling the traffic?
Continue reading Is the rolling jam attack considered a MITM attack