👤

it can help prevent attackers from monitoring or recording traffic between resources and computer ICT​