MITM attacks are common, but noisy - BGP hijacks are literally public to the internet by their nature. I believe that insisting on coupling confidentiality to authenticity is counterproductive and prevents the development of more sophisticated security models and network design.
orev|10 months ago
steventhedev|10 months ago
Which for some threat models is sufficiently good.