I’m thinking the same, if you manage to capture the initial key exchanges there has to be a way to decrypt messages. I’m not sure, but there is actual software developed to mine key exchanges from collected network traffic so I’m not really optimistic.
I believe that as long as the client is able to verify the integrity of the servers static public key a MITM attack is impossible as the verification of the hash would fail.
@2:53 how are your machine and linux machine on different ip's. how do they communicate on different networks. is this something to do without router settings.