How does an attacker observe network traffic exchanged between two users?