what if the silent payment gets intercepted by a middle man through "Man in the middle attack" whereby Alice' public key was changed by the attacker to his own public key then sends to Bob and in similar way, Bob's public key gets changed by the attacker and forwards his own public key to Alice, then can he control the transaction in his favor and compute the both public keys with his private key? And what are the ways to bypass such attack when using silent payment?