<P> In 2011, a security breach of the Dutch certificate authority DigiNotar resulted in the fraudulent issuing of certificates . Subsequently, the fraudulent certificates were used to perform man - in - the - middle attacks . </P> <P> In 2013, the Nokia's Xpress Browser was revealed to be decrypting HTTPS traffic on Nokia's proxy servers, giving the company clear text access to its customers' encrypted browser traffic . Nokia responded by saying that the content was not stored permanently, and that the company had organizational and technical measures to prevent access to private information . </P> <P> In 2017, Equifax withdrew its mobile phone apps following concern about man - in - the - middle vulnerabilities . </P> <P> Other notable real - life implementations include the following: </P>

What is the key requirement for a man-in-the-middle attack to be successful