As we discussed in lecture the attacker can control