Knowing this, attackers perform downgrade attacks, inserting themselves in the
middle of a TLS handshake and attempting to persuade the client and server to
fall back to a less secure algorithm—in the hope of being able to intercept and
snoop on traffic.