Compromising the client Computer system, for instance by putting in a destructive root certificate to the program or browser trust store. CIDR is based on the concept that IP addresses may be allocated and routed centered on their own community prefix in lieu of their class, which was the normal http://XXX