Now I want to ask a few questions about this protocol to see that
you can understand some of the things that could go wrong
with this simplified version of TLS.
Here are some possibilities and keep in mind the threat model that we introduced earlier.
We're assuming an active attacker with limited computational power.
Check all the things that we should be worried about going wrong
the way the protocol is specified here.
