. . "The method is particularly advantageous as only the requests and responses of users for which a user identifier is stored in the set of unique user identifiers is intercepted." . .