Knowing this, attackers perform downgrade attacks, inserting themselves in the middle of a TLS
handshake and attempting to persuade the client and server to fall back to a less secure
algorithm—in the hope of being able to intercept and snoop on traffic.