Figure 3. An example of network traffic capture when TLS encryption is not enabled