How can an attacker observe network traffic exchanged between two users?